Based on the current situation and requirements of urban smart tourism development, B/S architecture and database technology are used to build a city-oriented smart tourism management system from three aspects: system architecture, system functions and system implementation, in order to lay a solid foundation for urban tourism management intelligence and information. The basis for the comprehensive implementation of management. After operation, the system can meet the corresponding standards of smart tourism cities, integrate most tourism resources, and effectively promote the development of pilot cities' tourism informatization and urban tourism intelligence.
{"title":"Research on Urban Smart Tourism System based on Computer Big Data Platform","authors":"L. Du, Xuedong Yang","doi":"10.1145/3558819.3565096","DOIUrl":"https://doi.org/10.1145/3558819.3565096","url":null,"abstract":"Based on the current situation and requirements of urban smart tourism development, B/S architecture and database technology are used to build a city-oriented smart tourism management system from three aspects: system architecture, system functions and system implementation, in order to lay a solid foundation for urban tourism management intelligence and information. The basis for the comprehensive implementation of management. After operation, the system can meet the corresponding standards of smart tourism cities, integrate most tourism resources, and effectively promote the development of pilot cities' tourism informatization and urban tourism intelligence.","PeriodicalId":373484,"journal":{"name":"Proceedings of the 7th International Conference on Cyber Security and Information Engineering","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129383785","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The influence of vertical Euclidean distance on the compression effect was analyzed when Sliding Window algorithm was used to compress the surface-ship trajectory data. The optimum distance threshold was selected by analyzing the influence of compression ratio, compression complexity and compression errors. According to the disadvantage of fixed distance threshold, an adaptive threshold Sliding Window algorithm was proposed. The algorithm could adjust the distance threshold adaptively according to the characteristics of the surface-ship trajectory data so as to reduce the compression errors. The experimental results showed that the proposed adaptive threshold Sliding Window algorithm can greatly reduce the compression errors which were only one fifth of those in the Sliding Window algorithm with fixed threshold.
{"title":"The Influence of Threshold on Sliding Window Algorithm for Surface-Ship Trajectory Compression","authors":"Hua Li, Xiaojun Zhang","doi":"10.1145/3558819.3565180","DOIUrl":"https://doi.org/10.1145/3558819.3565180","url":null,"abstract":"The influence of vertical Euclidean distance on the compression effect was analyzed when Sliding Window algorithm was used to compress the surface-ship trajectory data. The optimum distance threshold was selected by analyzing the influence of compression ratio, compression complexity and compression errors. According to the disadvantage of fixed distance threshold, an adaptive threshold Sliding Window algorithm was proposed. The algorithm could adjust the distance threshold adaptively according to the characteristics of the surface-ship trajectory data so as to reduce the compression errors. The experimental results showed that the proposed adaptive threshold Sliding Window algorithm can greatly reduce the compression errors which were only one fifth of those in the Sliding Window algorithm with fixed threshold.","PeriodicalId":373484,"journal":{"name":"Proceedings of the 7th International Conference on Cyber Security and Information Engineering","volume":"165 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133643750","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The self-healing function of the distribution network can be realized by diagnosing and warning the distribution network before the fault and locating and isolating the distribution network after the fault, so as to ensure the safe and stable operation of the distribution network and the reliable use of electricity by users. In this study, the self-healing function of distribution network is included in the factors of distribution network planning. Taking the whole life cycle as the objective function and the profit maximization as the objective, a multi-stage planning model considering the self-healing function of distribution network is established, and the optimal scheme under multi-stage planning is obtained by using genetic algorithm. In this study, the results of multi-stage planning were used as variables to minimize the full life cycle costs. The results show that although the planning method considering self-healing function has a large investment in the early stage, the profit is more substantial in the long run, and it is beneficial to reduce the operation risk of distribution network.
{"title":"Research on Multistage Self-healing Planning of Distribution Network based on Genetic Algorithm","authors":"Ruifeng Zhao, Zhiwen Yu, Kaiyan Pan, Jiangang Lu, Zhanqiang Xu, Hanzhi Zhang, Hua Liu","doi":"10.1145/3558819.3565464","DOIUrl":"https://doi.org/10.1145/3558819.3565464","url":null,"abstract":"The self-healing function of the distribution network can be realized by diagnosing and warning the distribution network before the fault and locating and isolating the distribution network after the fault, so as to ensure the safe and stable operation of the distribution network and the reliable use of electricity by users. In this study, the self-healing function of distribution network is included in the factors of distribution network planning. Taking the whole life cycle as the objective function and the profit maximization as the objective, a multi-stage planning model considering the self-healing function of distribution network is established, and the optimal scheme under multi-stage planning is obtained by using genetic algorithm. In this study, the results of multi-stage planning were used as variables to minimize the full life cycle costs. The results show that although the planning method considering self-healing function has a large investment in the early stage, the profit is more substantial in the long run, and it is beneficial to reduce the operation risk of distribution network.","PeriodicalId":373484,"journal":{"name":"Proceedings of the 7th International Conference on Cyber Security and Information Engineering","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133133791","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Nowadays, with the rapid development of the Internet, social reviews conducted through the Internet have become the main source for people to obtain product information. These reviews help individuals, companies and institutions make decisions. Although social commentary can help people provide more objective and comprehensive information, some individuals or organizations use this method to spread false and untrue information to the outside world, thereby affecting the outside world's judgment on the authenticity of the information, resulting in economic losses. Here is a study of user behavior and comment language to address the difficulties of money fraud. Social fraud detection uses a framework of three key components for review: the review itself, the user performing the review, and the item being reviewed are three key components used by social fraud detection. Under this framework, we do this through appropriate sequence modeling methods, Hidden Markov Models (HMM) and Artificial Neural Networks (ANN) are two examples. By summarizing and expanding the contributions of key persons in the subject of financial fraud, we assist new scholars in the field in providing some theoretical support.
{"title":"The Application of Neural Networks to Fraud Detection","authors":"Pengjun Guan","doi":"10.1145/3558819.3565092","DOIUrl":"https://doi.org/10.1145/3558819.3565092","url":null,"abstract":"Nowadays, with the rapid development of the Internet, social reviews conducted through the Internet have become the main source for people to obtain product information. These reviews help individuals, companies and institutions make decisions. Although social commentary can help people provide more objective and comprehensive information, some individuals or organizations use this method to spread false and untrue information to the outside world, thereby affecting the outside world's judgment on the authenticity of the information, resulting in economic losses. Here is a study of user behavior and comment language to address the difficulties of money fraud. Social fraud detection uses a framework of three key components for review: the review itself, the user performing the review, and the item being reviewed are three key components used by social fraud detection. Under this framework, we do this through appropriate sequence modeling methods, Hidden Markov Models (HMM) and Artificial Neural Networks (ANN) are two examples. By summarizing and expanding the contributions of key persons in the subject of financial fraud, we assist new scholars in the field in providing some theoretical support.","PeriodicalId":373484,"journal":{"name":"Proceedings of the 7th International Conference on Cyber Security and Information Engineering","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128833843","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper studies and designs an optimal supply chain planning model based on 0-1 programming algorithm based on the optimal supply chain planning problem in raw material supply process. Based on the analysis of actual supply chain planning requirements, the mathematical models of optimal supply scheme and optimal transport scheme are constructed. The 0-1 planning model established in this paper has a wide range of applications. It can also be applied to path planning, sales and other links, and can be solved in combination with the actual situation, which has good popularization.
{"title":"Intelligent evaluation and optimization model of supply chain based on 0-1 programming and TOPSIS","authors":"Shuhan Wang, Dongcai Liang, Haomin Ren","doi":"10.1145/3558819.3565107","DOIUrl":"https://doi.org/10.1145/3558819.3565107","url":null,"abstract":"This paper studies and designs an optimal supply chain planning model based on 0-1 programming algorithm based on the optimal supply chain planning problem in raw material supply process. Based on the analysis of actual supply chain planning requirements, the mathematical models of optimal supply scheme and optimal transport scheme are constructed. The 0-1 planning model established in this paper has a wide range of applications. It can also be applied to path planning, sales and other links, and can be solved in combination with the actual situation, which has good popularization.","PeriodicalId":373484,"journal":{"name":"Proceedings of the 7th International Conference on Cyber Security and Information Engineering","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127842982","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Data mining has been widely used in many aspects of industrial production, agriculture and daily life. Using spectral analysis to monitor objects can obtain much more information than traditional methods. The crack in combustion chamber of internal combustion engine is an occasional fault, but once it happens, it deteriorates quickly and causes serious harm. The commonly used monitoring methods include disassembly inspection after shutdown or endoscopy after shutdown. This method is time-consuming, laborious and inefficient, and cannot meet the requirements of current equipment management. A method of UV fluorescence analysis of the coolant is proposed to quickly detect whether there is diesel fuel in the coolant and determine whether there is crack in the combustor. By irradiating the coolant with 275nm excitation light source, the spectral data of 260nm-1060nm wide spectrum can be obtained. The fluorescent characteristics of diesel fuel in cooling water indicate that there may be cracks in the combustion chamber. The fluorescent characteristics of lubricating oil in cooling water indicate the possibility of leakage of lubricating oil cooler. It provides an efficient and fast method for monitoring the incipient faults of diesel engine such as combustion chamber crack and oil cooler leakage.
{"title":"Application of UV fluorescence data mining to engine coolant monitoring","authors":"HongXiang Tian, Jing Li, He Wei","doi":"10.1145/3558819.3565458","DOIUrl":"https://doi.org/10.1145/3558819.3565458","url":null,"abstract":"Data mining has been widely used in many aspects of industrial production, agriculture and daily life. Using spectral analysis to monitor objects can obtain much more information than traditional methods. The crack in combustion chamber of internal combustion engine is an occasional fault, but once it happens, it deteriorates quickly and causes serious harm. The commonly used monitoring methods include disassembly inspection after shutdown or endoscopy after shutdown. This method is time-consuming, laborious and inefficient, and cannot meet the requirements of current equipment management. A method of UV fluorescence analysis of the coolant is proposed to quickly detect whether there is diesel fuel in the coolant and determine whether there is crack in the combustor. By irradiating the coolant with 275nm excitation light source, the spectral data of 260nm-1060nm wide spectrum can be obtained. The fluorescent characteristics of diesel fuel in cooling water indicate that there may be cracks in the combustion chamber. The fluorescent characteristics of lubricating oil in cooling water indicate the possibility of leakage of lubricating oil cooler. It provides an efficient and fast method for monitoring the incipient faults of diesel engine such as combustion chamber crack and oil cooler leakage.","PeriodicalId":373484,"journal":{"name":"Proceedings of the 7th International Conference on Cyber Security and Information Engineering","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127415678","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The implementation of traffic sign recognition is of great significance for promoting social progress and the harmony of human environment. The purpose of this paper is to study the optimization algorithm of intelligent image recognition technology. In order to reduce the total number of parameters in the training process, reduce the memory capacity, but ensure the accuracy of network identification, based on the AlexNet model, two improvement and optimization dimensions are proposed for design and network development. AlexNet deep network and architecture network, defining model parameters. The consistency of the model and the progress of the algorithm are demonstrated by observing the normal training method and the performance loss with the number of repetitions. The final application of traffic sign recognition achieved good results, achieving accurate recognition of 90% of the GTSRB data. The traffic recognition algorithm in this paper is trained on data sets from real scenes, so that the algorithm has refined and powerful capabilities for the isolation and identification of practical application scenarios, and has a good automatic algorithm.
{"title":"An Optimization Algorithm of Intelligent Traffic Image Recognition Technology","authors":"Yongjun Qiang","doi":"10.1145/3558819.3565119","DOIUrl":"https://doi.org/10.1145/3558819.3565119","url":null,"abstract":"The implementation of traffic sign recognition is of great significance for promoting social progress and the harmony of human environment. The purpose of this paper is to study the optimization algorithm of intelligent image recognition technology. In order to reduce the total number of parameters in the training process, reduce the memory capacity, but ensure the accuracy of network identification, based on the AlexNet model, two improvement and optimization dimensions are proposed for design and network development. AlexNet deep network and architecture network, defining model parameters. The consistency of the model and the progress of the algorithm are demonstrated by observing the normal training method and the performance loss with the number of repetitions. The final application of traffic sign recognition achieved good results, achieving accurate recognition of 90% of the GTSRB data. The traffic recognition algorithm in this paper is trained on data sets from real scenes, so that the algorithm has refined and powerful capabilities for the isolation and identification of practical application scenarios, and has a good automatic algorithm.","PeriodicalId":373484,"journal":{"name":"Proceedings of the 7th International Conference on Cyber Security and Information Engineering","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115618415","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper introduces the detection method of the operating state of insulators on the transmission line at present, and proposes a new method of detecting the operating state of insulators based on the infrared temperature measurement technology of UAV. The infrared temperature measurement device carried by UAV is used to measure the insulators, which greatly improves the detection efficiency and reduces the safety risk.
{"title":"Intelligent UAV Equipped with Infrared Equipment Applied in Measuring Zero Insulatorat in Different Temperatures","authors":"Dewen Zhang, Xiangyu Zhao, Jian Zhang, Xing Tang, Yuenan Guo, Xianfeng Lin, Zhen Zhang","doi":"10.1145/3558819.3565189","DOIUrl":"https://doi.org/10.1145/3558819.3565189","url":null,"abstract":"This paper introduces the detection method of the operating state of insulators on the transmission line at present, and proposes a new method of detecting the operating state of insulators based on the infrared temperature measurement technology of UAV. The infrared temperature measurement device carried by UAV is used to measure the insulators, which greatly improves the detection efficiency and reduces the safety risk.","PeriodicalId":373484,"journal":{"name":"Proceedings of the 7th International Conference on Cyber Security and Information Engineering","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124095460","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Under foggy conditions, the images and videos collected by the device are blurred and poorly imaged, which greatly impacts the accuracy of subsequent visual tasks such as target detection and recognition. At present, the dehazing methods such as dark channel and AOD- Net based on estimating intermediate variables still have problems such as incomplete dehazing and large color error. Therefore, an image dehazing method based on the generative adversarial network is proposed. The generator adopts a dense block structure connected layer by layer to improve the details of the dehazed image. The discriminator uses PatchGAN to perform block determination and optimize the image resolution. Meanwhile, the generated dehazed image and the real fog-free image are trained and compared with the comparison method. The peak signal-to-noise ratio and structural similarity of the proposed method are improved on synthetic datasets, and the generated images retain better detail and clarity as observed by the human eye.
{"title":"Image dehazing algorithm based on improved generative adversarial network","authors":"H. Zhong, Jin Wu","doi":"10.1145/3558819.3565120","DOIUrl":"https://doi.org/10.1145/3558819.3565120","url":null,"abstract":"Under foggy conditions, the images and videos collected by the device are blurred and poorly imaged, which greatly impacts the accuracy of subsequent visual tasks such as target detection and recognition. At present, the dehazing methods such as dark channel and AOD- Net based on estimating intermediate variables still have problems such as incomplete dehazing and large color error. Therefore, an image dehazing method based on the generative adversarial network is proposed. The generator adopts a dense block structure connected layer by layer to improve the details of the dehazed image. The discriminator uses PatchGAN to perform block determination and optimize the image resolution. Meanwhile, the generated dehazed image and the real fog-free image are trained and compared with the comparison method. The peak signal-to-noise ratio and structural similarity of the proposed method are improved on synthetic datasets, and the generated images retain better detail and clarity as observed by the human eye.","PeriodicalId":373484,"journal":{"name":"Proceedings of the 7th International Conference on Cyber Security and Information Engineering","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114834900","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The automotive intelligent dual-pulse MIG composite arc technology fully integrates both laser and arc welding advantages. This paper analyzes the pulsed MIG arc. At the same time, the experiment adopts the new "Hyper Dip-pulse" intelligent control technology on the all-digital welding power source of the automobile production line. The experiment achieved the welding effect of a stable molten pool, increased penetration depth, and reduced porosity defects in stainless steel alloy welding. The double-pulse MIG composite arc welding significantly affects the weld width but has a limited effect on the weld penetration. Under the optimized process parameters, the double-pulse MIG hybrid welding can effectively eliminate the surface forming defects in the stainless-steel alloy laser weld, and the welding speed is increased by 50%.
{"title":"Research on Intelligent Double-Pulse MIG Compound arc Welding System of Computer Robot in Automobile Production Line","authors":"Qiang Zhu, Runkai Su, Jiangtao Zheng","doi":"10.1145/3558819.3565140","DOIUrl":"https://doi.org/10.1145/3558819.3565140","url":null,"abstract":"The automotive intelligent dual-pulse MIG composite arc technology fully integrates both laser and arc welding advantages. This paper analyzes the pulsed MIG arc. At the same time, the experiment adopts the new \"Hyper Dip-pulse\" intelligent control technology on the all-digital welding power source of the automobile production line. The experiment achieved the welding effect of a stable molten pool, increased penetration depth, and reduced porosity defects in stainless steel alloy welding. The double-pulse MIG composite arc welding significantly affects the weld width but has a limited effect on the weld penetration. Under the optimized process parameters, the double-pulse MIG hybrid welding can effectively eliminate the surface forming defects in the stainless-steel alloy laser weld, and the welding speed is increased by 50%.","PeriodicalId":373484,"journal":{"name":"Proceedings of the 7th International Conference on Cyber Security and Information Engineering","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114840894","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}