{"title":"Comprehensive evaluation and analysis of the culture of mining and metallurgy enterprises by combining the spherical network structure model constructed by the calculation algorithm","authors":"Qing-xian Zhao","doi":"10.1109/ITCA52113.2020.00034","DOIUrl":"https://doi.org/10.1109/ITCA52113.2020.00034","url":null,"abstract":"Choosing a more scientific evaluation system can evaluate the cultural construction of an enterprise reasonably. With the development of science and technology, the integration of computers in all fields of various industries is inseparable. Computer algorithms play an irreplaceable role in building various models. Mining and metallurgical enterprises have their own particularities. It is of theoretical and practical value to construct a system that can comprehensively evaluate mining and metallurgy culture through the processing of computer algorithms. Therefore, based on the characteristics of mining and metallurgy culture, this paper takes the corporate culture construction of China Pingmei Shenma Group as the research object and conducts a comprehensive evaluation. After comprehensive evaluation, two conclusions are drawn: one is that the cultural construction of the enterprise is relatively good; the other is that the spherical network structure model is verified to be feasible in the evaluation of cultural enterprise.","PeriodicalId":103309,"journal":{"name":"2020 2nd International Conference on Information Technology and Computer Application (ITCA)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116951687","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on Stock Price Prediction Method Based on Deep Learning","authors":"Dong Liu, Ang Chen, Juanjuan Wu","doi":"10.1109/ITCA52113.2020.00022","DOIUrl":"https://doi.org/10.1109/ITCA52113.2020.00022","url":null,"abstract":"The future trend prediction of time series represented by stock price has always been a key research topic in the field of data science. The rapid development of deep learning makes the analysis and prediction of time series enter a new stage. Deep learning algorithm represented by deep neural network can effectively overcome the shortcomings of traditional time series analysis methods. This paper first introduces the principle and structure of the recurrent neural network (RNN) model in the deep neural network. In view of the problem that the gradient vanishes easily and cannot effectively analyze the long sequence data, this paper introduces the gating structure to improve the hidden layer of the RNN, so as to construct the long short-term memory (LSTM) neural network model. In this paper, the LSTM neural network model is applied to the stock price prediction, and the prediction results are compared with the RNN model. The experimental results show that the error value of the LSTM neural network model is smaller than that of the RNN model, and has better prediction effect. Therefore, the LSTM neural network model is more suitable for the prediction of stock price.","PeriodicalId":103309,"journal":{"name":"2020 2nd International Conference on Information Technology and Computer Application (ITCA)","volume":"89 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115083752","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Surface Defect Detection Methods Based on Deep Learning: a Brief Review","authors":"Guanlin Liu","doi":"10.1109/ITCA52113.2020.00049","DOIUrl":"https://doi.org/10.1109/ITCA52113.2020.00049","url":null,"abstract":"Surface defect detection techniques based on deep learning have been widely used in various industrial scenarios. This paper reviews the latest works on deep learning-based surface defect detection methods. They are classified into three categories: full-supervised learning model method, unsupervised learning model method, and other methods. The typical methods are further subdivided and compared. The advantages and disadvantages of these methods and their application scenarios are summarized. This paper analyzes three key issues in surface defect detection and introduces common data sets for industrial surface defects. Finally, the future development trend of surface defect detection is predicted.","PeriodicalId":103309,"journal":{"name":"2020 2nd International Conference on Information Technology and Computer Application (ITCA)","volume":"120 1-3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123574956","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on Performance Optimization for Sparse Matrix-Vector Multiplication in Multi/Many-core Architecture","authors":"Qihan Wang, Mingliang Li, J. Pang, Dixia Zhu","doi":"10.1109/ITCA52113.2020.00081","DOIUrl":"https://doi.org/10.1109/ITCA52113.2020.00081","url":null,"abstract":"Sparse matrix vector multiplication is an important and commonly used computing kernel in scientific computing. Irregular arrangement of non zeros in sparse matrix leads to irregular memory access pattern, which in turn affects the running speed. In the past ten years, there have been many optimization methods of sparse matrix vector multiplication based on different ideas and techniques. In this paper, the commonly used performance optimization techniques of sparse matrix vector multiplication in multi/many-core architecture are comprehensively investigated. We classify technical methods according to their common characteristics, and discuss the problems encountered by researchers of various methods. In addition, We provide a typical large sparse matrix set for testing. This paper also provides a theoretical basis for our subsequent sparse matrix calculation in Sunway TaihuLight archiecture.","PeriodicalId":103309,"journal":{"name":"2020 2nd International Conference on Information Technology and Computer Application (ITCA)","volume":"22 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115574119","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cell proliferation detection based on deep learning","authors":"Hao Wang, X. Lv, Guohua Wu, Guodong Lv, Xiangxiang Zheng","doi":"10.1109/ITCA52113.2020.00051","DOIUrl":"https://doi.org/10.1109/ITCA52113.2020.00051","url":null,"abstract":"Cell proliferation level is important in clinical diagnosis. Analysis of cell proliferation level can help to judge the development trend of patient's condition, which is helpful for diagnosis. In order to evaluate the level of cell proliferation, it is necessary to calculate the number and proportion of proliferating nuclei. However, when the number of nuclei is large, it will bring a great pressure on doctors, and the accuracy rate will also decline. To solve these problems, this paper proposes a scheme for automatic detection and counting of cell nuclei, which is large in number and densely distributed. Our dataset is obtained from mouse liver cells, a total of 136 samples, each containing 100-300 nuclei and the proliferation of nuclei are stained by immunohistochemical staining, of which 120 are trained using convolution neural network and 16 samples are tested to evaluate the effects of the models. Three models were trained by RetinaNet with backbone networks of Vgg6, ResNet50 and ResNet101 respectively, and compared with Image Pro Plus 6.0. Experiments show that our models achieve higher accuracy compared with 67.2% obtained by manual using Image-Pro Plus 6.0 for detection and counting. It can be seen that in terms of detection accuracy, our models are better than the analysis software widely used in hospitals, effectively solving the problems of long manual detection time and low accuracy. It can effectively help doctors to evaluate the level of cell proliferation, and then quickly make a corresponding diagnosis.","PeriodicalId":103309,"journal":{"name":"2020 2nd International Conference on Information Technology and Computer Application (ITCA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115717948","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Secure Transmission Strategy of Network Communication layer Relay based on Satellite Transmission","authors":"Liu Xu","doi":"10.1109/itca52113.2020.00064","DOIUrl":"https://doi.org/10.1109/itca52113.2020.00064","url":null,"abstract":"In recent years, the continuous development of wireless communication technology has brought great convenience to people’s work and life. However, due to the openness of the wireless channel, the information is vulnerable to eavesdropping and interference from illegal users in the process of transmission. As usual, the security of information and information is guaranteed by the high-level encryption system, but with the increasing strength of the computing power of computers, the traditional encryption system has not been fully implemented which cannot meet the security requirements of the current wireless communication network. With the development of information technology, satellite communication has been widely used, especially in the military field. However, with the increasingly severe and complex military struggle, higher requirements are put forward for the security and anti-jamming capability of satellite communications. In the satellite communication support and training, we often find that once the polarization angle of the antenna feed module changes, the signal intensity also changes. At the same time, in order to solve the problem that the trust information of both sides of the ship data transmission method is lost in the case of a large amount of data, which leads to the abnormal security of data transmission, this paper studies the application of network security encryption technology in warship data transmission. Through the chaotic map transformation to update the key value in the register, the wheel key component is obtained. Then based on which the network transmission encryption algorithm is designed, the encryption of each data transmission is realized through iterative calculation. And the secure communication protocol of data transmission is designed at the same time. The information of both parties is exchanged before transmission, the two-way identity authentication is realized, and the ship data is transmitted after the authentication is completed. The polarization characteristic of the signal has a good performance in the nonlinear response of the device, the alleviation of the shortage of spectrum resources, anti-interference and so on.","PeriodicalId":103309,"journal":{"name":"2020 2nd International Conference on Information Technology and Computer Application (ITCA)","volume":"100 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122677353","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Simulation design of an X-band high isolation circulator","authors":"Haiping Ren, Yongjun Xie","doi":"10.1109/ITCA52113.2020.00087","DOIUrl":"https://doi.org/10.1109/ITCA52113.2020.00087","url":null,"abstract":"In this paper, a X-band waveguide circulator operating at 11 to 13 GHz is designed. The parameters of the circulator are optimized by HFSS (high-frequency electromagnetic simulation software). Isolation is a key indicator of the circulator. The simulation results show that the isolation of the circulator in the working frequency band is greater than 30dB, and the relative bandwidth exceeds 16%. In addition, the voltage standing wave ratios of the three ports are all less than 1.1. Therefore, the circulator presented in this paper can provide a reference scheme for the design of high isolation circulator.","PeriodicalId":103309,"journal":{"name":"2020 2nd International Conference on Information Technology and Computer Application (ITCA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130270075","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Control of DC Grid for Fault Current Limiting and System Fast Recovery","authors":"Shu Zhang, Hanchen Li, Huajing Li, Huadong Li, Wanli Zhang, Yingbei Fang","doi":"10.1109/ITCA52113.2020.00076","DOIUrl":"https://doi.org/10.1109/ITCA52113.2020.00076","url":null,"abstract":"DC circuit breaker is one of the alternatives for clearing DC faults in flexible DC power grids, and its cost is closely related to its volume and its breaking current. In this paper, starting from the level of reducing the breaking fault current of the DC circuit breaker (DCCB), a dual adaptive controller suitable for MMC fault current limiting and rapid system recovery is designed. By adjusting the reference value of the MMC DC voltage and the capacitor voltage of the bridge arm sub-module, the development speed of the fault current can be automatically limited, and the system recovery after the fault can be accelerated. The design method and structure of the dual adaptive controller are introduced, and the mechanism of action is theoretically analyzed.","PeriodicalId":103309,"journal":{"name":"2020 2nd International Conference on Information Technology and Computer Application (ITCA)","volume":"115 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121380270","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Secure Routing Algorithm Based on Trust Value for Micro-nano Satellite Network","authors":"Yuanming Ding, Yu Zhao, Ran Zhang","doi":"10.1109/ITCA52113.2020.00056","DOIUrl":"https://doi.org/10.1109/ITCA52113.2020.00056","url":null,"abstract":"With the increasing application of micro-nano satellite network, it is extremely vulnerable to the influence of internal malicious nodes in the practical application process. However, currently micro-nano satellite network still lacks effective means of routing security protection. In order to solve this problem, combining with the characteristics of limited energy and computing capacity of micro-nano satellite nodes, this research proposes a secure routing algorithm based on trust value. First, the trust value of the computing node is synthesized, and then the routing path is generated by combining the trust value of the node with the AODV routing algorithm. Simulation results show that the proposed MNS-AODV routing algorithm can effectively resist the influence of internal malicious nodes on data transmission, and it can reduce the packet loss rate and average energy consumption.","PeriodicalId":103309,"journal":{"name":"2020 2nd International Conference on Information Technology and Computer Application (ITCA)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126330055","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Wu Dan, Li Yin, Wang Yeying, Wang Rui, Fan Chen, Zhang Zhongyang, Hu Dongdong, Guo Liang
{"title":"Research on aerospace data transaction platform and method based on blockchain","authors":"Wu Dan, Li Yin, Wang Yeying, Wang Rui, Fan Chen, Zhang Zhongyang, Hu Dongdong, Guo Liang","doi":"10.1109/ITCA52113.2020.00092","DOIUrl":"https://doi.org/10.1109/ITCA52113.2020.00092","url":null,"abstract":"This article authorizes all relevant participants to join the private blockchain network and form a stakeholder alliance to jointly maintain the operation of the blockchain. It not only ensures the legal compliance of the participants in the transaction system, increases mutual trust between the participants, but also provides an open and collaborative environment, and realizes the benign circulation of aerospace industry resources. The data transaction method in this article covers the entire life cycle process of data production and transaction, and uses blockchain technology to ensure data credibility, data security, and transaction traceability. It solves the problems of proof of the value of aerospace test data, data security and network transaction trust, protects the interests of both parties in the transaction, and effectively expands the application scope of aerospace industry resources.","PeriodicalId":103309,"journal":{"name":"2020 2nd International Conference on Information Technology and Computer Application (ITCA)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126484956","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}