Pub Date : 2021-07-01DOI: 10.1109/icnisc54316.2021.00001
{"title":"2021 7th Annual International Conference on Network and Information Systems for Computers.","authors":"","doi":"10.1109/icnisc54316.2021.00001","DOIUrl":"https://doi.org/10.1109/icnisc54316.2021.00001","url":null,"abstract":"","PeriodicalId":396802,"journal":{"name":"2021 7th Annual International Conference on Network and Information Systems for Computers (ICNISC)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114348677","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this paper, we present our design of a smart wristband, iFit, which runs our customized operating system to monitor the wearer's daily activities. The smart wristband consists of a 3-axis gyroscope and a 3-axis accelerometer which records the user's motion data as six-axis time series data. We train a pattern model for different activities, such as walking, running and playing badminton. So iFit can automatically detect the types of ongoing sports and record a precise calorie consumption based on user's personal profile (e.g., weight and height).
{"title":"An Edge Device for Personal Big Data Tracking","authors":"Haichao Huang, Yuqing Xie, Zhangchi Ying, Chang Yao, Peng-Fei Lu, Xianke Zhou","doi":"10.1109/ICNISC54316.2021.00095","DOIUrl":"https://doi.org/10.1109/ICNISC54316.2021.00095","url":null,"abstract":"In this paper, we present our design of a smart wristband, iFit, which runs our customized operating system to monitor the wearer's daily activities. The smart wristband consists of a 3-axis gyroscope and a 3-axis accelerometer which records the user's motion data as six-axis time series data. We train a pattern model for different activities, such as walking, running and playing badminton. So iFit can automatically detect the types of ongoing sports and record a precise calorie consumption based on user's personal profile (e.g., weight and height).","PeriodicalId":396802,"journal":{"name":"2021 7th Annual International Conference on Network and Information Systems for Computers (ICNISC)","volume":"138 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115013854","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-07-01DOI: 10.1109/ICNISC54316.2021.00052
Wei Wei
AR technology superimposes computer-generated virtual worlds on the real world, which redefines the coexistence mode of physical space and Internet, and has a broad application prospect. In this paper, the practical application of AR technology in research tourism through a case is introduced and the necessity and advantages of integrating AR technology into rural red research tourism are discussed and analysed. Finally, two ways of integrating AR technology into rural red research are proposed, namely, reappearing historical scenes and activating historical buildings.
{"title":"Research on the Integrated Development of AR Technology and Rural Red Research Tourism","authors":"Wei Wei","doi":"10.1109/ICNISC54316.2021.00052","DOIUrl":"https://doi.org/10.1109/ICNISC54316.2021.00052","url":null,"abstract":"AR technology superimposes computer-generated virtual worlds on the real world, which redefines the coexistence mode of physical space and Internet, and has a broad application prospect. In this paper, the practical application of AR technology in research tourism through a case is introduced and the necessity and advantages of integrating AR technology into rural red research tourism are discussed and analysed. Finally, two ways of integrating AR technology into rural red research are proposed, namely, reappearing historical scenes and activating historical buildings.","PeriodicalId":396802,"journal":{"name":"2021 7th Annual International Conference on Network and Information Systems for Computers (ICNISC)","volume":"476 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131924675","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-07-01DOI: 10.1109/ICNISC54316.2021.00160
G. Liao, M. Hang
In recent years, textile industry has encountered environmental problems such as atmospheric dust pollution, illegal discharge of pollutants, and accumulation of solid pollutants. However, how to evaluate the environmental governance efficiency of textile enterprises has become a problem. In this paper, we establish a evaluation system for the environmental governance performance evaluation of textile companies and give some suggestions, so that the enterprise can be more friendly to environment with highly development.
{"title":"The Research On Evaluation of Textile Enterprise Environmental Governance Efficiency","authors":"G. Liao, M. Hang","doi":"10.1109/ICNISC54316.2021.00160","DOIUrl":"https://doi.org/10.1109/ICNISC54316.2021.00160","url":null,"abstract":"In recent years, textile industry has encountered environmental problems such as atmospheric dust pollution, illegal discharge of pollutants, and accumulation of solid pollutants. However, how to evaluate the environmental governance efficiency of textile enterprises has become a problem. In this paper, we establish a evaluation system for the environmental governance performance evaluation of textile companies and give some suggestions, so that the enterprise can be more friendly to environment with highly development.","PeriodicalId":396802,"journal":{"name":"2021 7th Annual International Conference on Network and Information Systems for Computers (ICNISC)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133703307","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-07-01DOI: 10.1109/ICNISC54316.2021.00010
Xiuhong Yang, Peng Xu, Haiyan Jin, Jie Zhang
Image completion refers to utilizing image residual information to repair the missing part. In order to solve the problem that the existing models cannot learn the deep features of the image, resulting in inaccurate artifacts in the repaired details, and the inconsistency between the repaired part and the adjacent pixels, we propose a semantic face completion method based on DCGAN with dual discriminator in this paper. We improve DCGAN with dual discriminator to ensure the consistency of local part and global image. In addition, we utilize the VGG16 network to help learn the deep features of the image to make the repaired result clearer and more realistic at the pixel level. Therefore, our method generates images by optimizing the generators with three kinds of loss functions, which are composed of dual image reconstruction loss, dual adversarial loss, and dual image feature reconstruction loss. Experiments on celebA datasets show that the model can get reasonable repairing results, and PSNR and SSIM are higher than baseline on most test datasets.
{"title":"Semantic Face Completion Based on DCGAN with Dual-Discriminator","authors":"Xiuhong Yang, Peng Xu, Haiyan Jin, Jie Zhang","doi":"10.1109/ICNISC54316.2021.00010","DOIUrl":"https://doi.org/10.1109/ICNISC54316.2021.00010","url":null,"abstract":"Image completion refers to utilizing image residual information to repair the missing part. In order to solve the problem that the existing models cannot learn the deep features of the image, resulting in inaccurate artifacts in the repaired details, and the inconsistency between the repaired part and the adjacent pixels, we propose a semantic face completion method based on DCGAN with dual discriminator in this paper. We improve DCGAN with dual discriminator to ensure the consistency of local part and global image. In addition, we utilize the VGG16 network to help learn the deep features of the image to make the repaired result clearer and more realistic at the pixel level. Therefore, our method generates images by optimizing the generators with three kinds of loss functions, which are composed of dual image reconstruction loss, dual adversarial loss, and dual image feature reconstruction loss. Experiments on celebA datasets show that the model can get reasonable repairing results, and PSNR and SSIM are higher than baseline on most test datasets.","PeriodicalId":396802,"journal":{"name":"2021 7th Annual International Conference on Network and Information Systems for Computers (ICNISC)","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122049080","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-07-01DOI: 10.1109/ICNISC54316.2021.00187
Yixiang Dai, Encai Ji, Yong Yao
EEG emotion recognition is able to provide a scientific solution for emotional health assessment. Feature extraction is the fundamental procedure. Traditionally, the future set is generated by the existing theories or rules, which is not convincing and objective enough. Therefore, this paper proposes a data-driven automatic feature extraction methodology for web-enabled EEG emotion recognition based on 2-hidden-layer stacked auto-encoder. Since the web-enabled framework provides large scale of EEG data, emotion-related EEG features can be extracted directly from the time-domain raw wave, which is different from the typical feature extraction methods based on rules and experiences. With the optimal experimental parameters setting, the proposed method extracts typical time-domain distinguishable features from the EEG raw data and obtains relatively low classification error rate. This paper takes a step further towards automatic feature extraction for web-enabled EEG emotion recognition and make the entire framework more impersonal and convincing.
{"title":"Stacked Auto-Encoder Driven Automatic Feature Extraction for Web-Enabled EEG Emotion Recognition","authors":"Yixiang Dai, Encai Ji, Yong Yao","doi":"10.1109/ICNISC54316.2021.00187","DOIUrl":"https://doi.org/10.1109/ICNISC54316.2021.00187","url":null,"abstract":"EEG emotion recognition is able to provide a scientific solution for emotional health assessment. Feature extraction is the fundamental procedure. Traditionally, the future set is generated by the existing theories or rules, which is not convincing and objective enough. Therefore, this paper proposes a data-driven automatic feature extraction methodology for web-enabled EEG emotion recognition based on 2-hidden-layer stacked auto-encoder. Since the web-enabled framework provides large scale of EEG data, emotion-related EEG features can be extracted directly from the time-domain raw wave, which is different from the typical feature extraction methods based on rules and experiences. With the optimal experimental parameters setting, the proposed method extracts typical time-domain distinguishable features from the EEG raw data and obtains relatively low classification error rate. This paper takes a step further towards automatic feature extraction for web-enabled EEG emotion recognition and make the entire framework more impersonal and convincing.","PeriodicalId":396802,"journal":{"name":"2021 7th Annual International Conference on Network and Information Systems for Computers (ICNISC)","volume":"209 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124705668","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-07-01DOI: 10.1109/ICNISC54316.2021.00061
Bo Sun, Wanzhou Xu, Qing Yang
To improve the performance of analog circuit fault diagnosis, an ensemble fault diagnosis method combining fast Fourier transform (FFT), convolutional neural network (CNN) and long and short-term memory (LSTM) is proposed. First, FFT is used to convert data to the frequency domain. Then special zone features are obtained by CNN network. Finally LSTM network is used to complete the fault diagnosis of the analog circuit. Experiment on CSTV analog circuit shows that FFT-CNN-LSTM can be used to improve the quality of analog circuit fault diagnosis.
{"title":"Analog Circuit Fault Diagnosis Based on FFT-CNN-LSTM","authors":"Bo Sun, Wanzhou Xu, Qing Yang","doi":"10.1109/ICNISC54316.2021.00061","DOIUrl":"https://doi.org/10.1109/ICNISC54316.2021.00061","url":null,"abstract":"To improve the performance of analog circuit fault diagnosis, an ensemble fault diagnosis method combining fast Fourier transform (FFT), convolutional neural network (CNN) and long and short-term memory (LSTM) is proposed. First, FFT is used to convert data to the frequency domain. Then special zone features are obtained by CNN network. Finally LSTM network is used to complete the fault diagnosis of the analog circuit. Experiment on CSTV analog circuit shows that FFT-CNN-LSTM can be used to improve the quality of analog circuit fault diagnosis.","PeriodicalId":396802,"journal":{"name":"2021 7th Annual International Conference on Network and Information Systems for Computers (ICNISC)","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124912244","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-07-01DOI: 10.1109/ICNISC54316.2021.00011
Fan Zhang, Bing Bu
Cyber security risk assessment is very important to quantify the security level of communication-based train control (CBTC) systems. In this paper, a methodology is proposed to assess the cyber security risk of CBTC systems that integrates complex network theory and attack graph method. On one hand, in order to determine the impact of malicious attacks on train control, we analyze the connectivity of movement authority (MA) paths based on the working state of nodes, the connectivity of edges. On the other hand, attack graph is introduced to quantify the probabilities of potential attacks that combine multiple vulnerabilities in the cyber world of CBTC. Experiments show that our methodology can assess the security risks of CBTC systems and improve the security level after implementing reinforcement schemes.
{"title":"A Cyber Security Risk Assessment Methodology for CBTC Systems Based on Complex Network Theory and Attack Graph","authors":"Fan Zhang, Bing Bu","doi":"10.1109/ICNISC54316.2021.00011","DOIUrl":"https://doi.org/10.1109/ICNISC54316.2021.00011","url":null,"abstract":"Cyber security risk assessment is very important to quantify the security level of communication-based train control (CBTC) systems. In this paper, a methodology is proposed to assess the cyber security risk of CBTC systems that integrates complex network theory and attack graph method. On one hand, in order to determine the impact of malicious attacks on train control, we analyze the connectivity of movement authority (MA) paths based on the working state of nodes, the connectivity of edges. On the other hand, attack graph is introduced to quantify the probabilities of potential attacks that combine multiple vulnerabilities in the cyber world of CBTC. Experiments show that our methodology can assess the security risks of CBTC systems and improve the security level after implementing reinforcement schemes.","PeriodicalId":396802,"journal":{"name":"2021 7th Annual International Conference on Network and Information Systems for Computers (ICNISC)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129465033","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-07-01DOI: 10.1109/ICNISC54316.2021.00184
Chang Wei, Bo Wei
As a kind of route clue, landmark is very important because it can convey a kind of enlightening hint when people make route choice. Pedestrians' cognition of landmarks is related to themselves, and the existing landmark selection methods do not consider user preferences. To solve this problem, considering setting topic parameters to represent user preferences for each landmark significance influencing factor, this paper constructs a landmark selection model based on similarity measure of Vague soft sets with user preferences, which the topic weights normalized by the topic parameters are integrated into the similarity measure equation of Vague soft sets, and the similarity measures to select landmarks are calculated by comparing with the ideal solutions. Compared with the existing methods, the landmarks selected by the method of this paper are more in line with the user cognition and more effective to prompt the user to choose the route.
{"title":"Landmark Selection Based on Similarity Measure of Vague Soft Sets Considering User Preferences","authors":"Chang Wei, Bo Wei","doi":"10.1109/ICNISC54316.2021.00184","DOIUrl":"https://doi.org/10.1109/ICNISC54316.2021.00184","url":null,"abstract":"As a kind of route clue, landmark is very important because it can convey a kind of enlightening hint when people make route choice. Pedestrians' cognition of landmarks is related to themselves, and the existing landmark selection methods do not consider user preferences. To solve this problem, considering setting topic parameters to represent user preferences for each landmark significance influencing factor, this paper constructs a landmark selection model based on similarity measure of Vague soft sets with user preferences, which the topic weights normalized by the topic parameters are integrated into the similarity measure equation of Vague soft sets, and the similarity measures to select landmarks are calculated by comparing with the ideal solutions. Compared with the existing methods, the landmarks selected by the method of this paper are more in line with the user cognition and more effective to prompt the user to choose the route.","PeriodicalId":396802,"journal":{"name":"2021 7th Annual International Conference on Network and Information Systems for Computers (ICNISC)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121001131","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-07-01DOI: 10.1109/ICNISC54316.2021.00147
M. Huan, Suyun Li, C. Zhang
The policy food plays an important role in China's food system. The information management of policy food needs to continuously optimize the existing processes to ensure that the management of the food department is in a high-efficiency state. The ESIA method is used as a tool and method of process reengineering theory. Its main purpose is to improve information management efficiency and reduce management costs by reengineering and optimizing the original process. Aiming at a series of problems such as inaccurate data and long information collection period in the policy food information management, this article uses the ESIA method to optimize the management process.
{"title":"Research on Process Optimization of Policy Food Information Management Based on ESIA Method","authors":"M. Huan, Suyun Li, C. Zhang","doi":"10.1109/ICNISC54316.2021.00147","DOIUrl":"https://doi.org/10.1109/ICNISC54316.2021.00147","url":null,"abstract":"The policy food plays an important role in China's food system. The information management of policy food needs to continuously optimize the existing processes to ensure that the management of the food department is in a high-efficiency state. The ESIA method is used as a tool and method of process reengineering theory. Its main purpose is to improve information management efficiency and reduce management costs by reengineering and optimizing the original process. Aiming at a series of problems such as inaccurate data and long information collection period in the policy food information management, this article uses the ESIA method to optimize the management process.","PeriodicalId":396802,"journal":{"name":"2021 7th Annual International Conference on Network and Information Systems for Computers (ICNISC)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122688218","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}