2020 2nd International Conference on Information Technology and Computer Application (ITCA)最新文献

筛选
英文 中文
Deep Learning Short-Term Traffic Flow Prediction Based on Lane Changing Behavior Recognition 基于变道行为识别的深度学习短期交通流预测
Li Xu, Wang Kun, Li Pengfei, Xu Miaoyu
{"title":"Deep Learning Short-Term Traffic Flow Prediction Based on Lane Changing Behavior Recognition","authors":"Li Xu, Wang Kun, Li Pengfei, Xu Miaoyu","doi":"10.1109/ITCA52113.2020.00163","DOIUrl":"https://doi.org/10.1109/ITCA52113.2020.00163","url":null,"abstract":"Short term traffic flow prediction is of great significance for reasonable traffic control and easing traffic congestion. Most of the existing methods are based on the traditional time-space parameters of traffic flow or feature extraction through deep neural network to predict short-term traffic flow. With the increase of road traffic volume, the influence of lane changing behavior on short-term traffic flow is greater. Combined with deep learning and image processing technology, a deep learning short-term traffic flow prediction method based on vehicle lane changing behavior recognition is proposed. The prediction results on real data sets show that the model has high prediction accuracy.","PeriodicalId":103309,"journal":{"name":"2020 2nd International Conference on Information Technology and Computer Application (ITCA)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126661688","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Study the quantity of handling robots for picking operation considering charging 研究考虑收费的拣货搬运机器人数量
Qingxi Liu, Yisong Li
{"title":"Study the quantity of handling robots for picking operation considering charging","authors":"Qingxi Liu, Yisong Li","doi":"10.1109/ITCA52113.2020.00113","DOIUrl":"https://doi.org/10.1109/ITCA52113.2020.00113","url":null,"abstract":"With the gradual expansion of e-commerce business scale, the warehouse picking operation is facing the production pressure of constant delivery time and increasing business volume. Therefore, enterprises need to adjust the resource allocation in the picking operation in time according to the order changes to ensure the order production efficiency. The handling robot is one of the resources that can be flexibly adjusted and directly affect the production time in the picking operation, so this paper considers adjusting the configuration of the handling robot. Due to the high unit price of the robot and the need to charge in the process of use, the enterprise also needs to balance the production efficiency and equipment cost. In addition, scheduling other robots during robot charging will also affect the number of robots. Therefore, this paper studies the number of handling robots in the picking operation considering charging, in order to ensure the production efficiency and reduce the cost of picking operation.","PeriodicalId":103309,"journal":{"name":"2020 2nd International Conference on Information Technology and Computer Application (ITCA)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120884838","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Parameter Study on the Operation Characteristics of the Self-circulating Evaporative Cooling System for High Performance Computer 高性能计算机自循环蒸发冷却系统运行特性的参数研究
Jielu Yan, L. Ruan
{"title":"Parameter Study on the Operation Characteristics of the Self-circulating Evaporative Cooling System for High Performance Computer","authors":"Jielu Yan, L. Ruan","doi":"10.1109/ITCA52113.2020.00052","DOIUrl":"https://doi.org/10.1109/ITCA52113.2020.00052","url":null,"abstract":"With the rapid development of high performance computer, the component power is getting higher and higher, and the density is getting denser. Then the cooling technology has become one of the core problem for the development of high performance computer. The self-circulating evaporative cooling system has the advantages of safety and efficiency. Then in this paper, parametric effect on the operation characteristics of the self-circulating evaporative cooling system for high performance computer was studied through experiment.","PeriodicalId":103309,"journal":{"name":"2020 2nd International Conference on Information Technology and Computer Application (ITCA)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126323125","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analysis of Protein in Diet vs COVID-19 with Machine Learning 用机器学习分析饮食中的蛋白质与COVID-19
Tianzhe Fang, Yuheng Shi, Beining Mu
{"title":"Analysis of Protein in Diet vs COVID-19 with Machine Learning","authors":"Tianzhe Fang, Yuheng Shi, Beining Mu","doi":"10.1109/ITCA52113.2020.00020","DOIUrl":"https://doi.org/10.1109/ITCA52113.2020.00020","url":null,"abstract":"From the first month in 2020, the coronavirus COVID-19 has swept the whole world like a hurricane, which caused a huge number of deaths around the world. There are a lot of different kinds of research on this pandemic. Because the health diet plays an important role in our immune system, which is contributed to the defense of the virus and the recovery after the treatment, this study aims to determine the relationships between the protein quantity in food and COVID-19. To find the correlation between them, we decide to use a basic regression as an analyzing tool to deal with it. To find the relationship between the quantity of protein in diet and COVID-19, we did the investigation first to find a proper dataset and a proper machine learning model. We tried to explore and investigate whether the protein in food is related to the recovery and death rate of COVID-19. By analyzing the data, we found that there is almost no correlation between the two. It seems the quantity of the protein plays a small role in the recuperation of COVID-19, however, there are many other factors, such as other nutritional elements, people’s age, gender, and their underlying disease types, etc., which all affect their recovery status of COVID-19. We need more information for our research and update or change a more proper model for it.","PeriodicalId":103309,"journal":{"name":"2020 2nd International Conference on Information Technology and Computer Application (ITCA)","volume":"117 25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126415607","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Sketch-to-Color Image with GANs 素描到彩色图像与gan
Wenbo Zhang
{"title":"Sketch-to-Color Image with GANs","authors":"Wenbo Zhang","doi":"10.1109/ITCA52113.2020.00075","DOIUrl":"https://doi.org/10.1109/ITCA52113.2020.00075","url":null,"abstract":"Unsupervised Learning is a trending research field of artificial intelligence, which aims to interpret and understand the hidden structure of the data. However, the development of deep learning with Generative Adversarial Networks (GANs) creates more possibilities for unsupervised learning. GAN is a category of Neural Networks, which are mostly applied to generating images. In this paper, how GAN was implemented to help with sketch-to-color translation is illustrated. In order to achieve this goal, data-preprocessing is implemented first. Then, the model is trained for 65 epochs, and the performance of the model is improved by virtue of loss functions and optimizers. In the end, a proper User Interface (GUI) is designed to have a full application, and people could turn any sketch picture they want into a colored image.","PeriodicalId":103309,"journal":{"name":"2020 2nd International Conference on Information Technology and Computer Application (ITCA)","volume":"205 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131951581","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Design and Implementation of IDC Information Security System Based on Deep Security 基于深度安全的IDC信息安全系统设计与实现
Xiao Yu Li, Qian Bin Chen
{"title":"Design and Implementation of IDC Information Security System Based on Deep Security","authors":"Xiao Yu Li, Qian Bin Chen","doi":"10.1109/ITCA52113.2020.00040","DOIUrl":"https://doi.org/10.1109/ITCA52113.2020.00040","url":null,"abstract":"Based on the deep security, this paper takes the current situation of IDC business development of domestic telecom operators and the national network information security protection requirements as the background, and takes the new project of IDC information security system in a province as the source of the subject, with three purposes. Firstly, this paper investigates and studies the difficulties of domestic telecom operators in the development of IDC services; secondly, this paper looks for the combination point of IDC business transformation of telecom operators and meets the new requirements of network information security based on deep security; thirdly, taking practical projects as an example, this paper improves the transformation strategy of \"two in one\" in practice.","PeriodicalId":103309,"journal":{"name":"2020 2nd International Conference on Information Technology and Computer Application (ITCA)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128938912","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Algorithm of Detecting Abnormal Behavior Based on Optical Flow Method 基于光流法的异常行为检测算法
Lu Yu, Yali Wang, Jie Li, Ye Tian
{"title":"Algorithm of Detecting Abnormal Behavior Based on Optical Flow Method","authors":"Lu Yu, Yali Wang, Jie Li, Ye Tian","doi":"10.1109/ITCA52113.2020.00047","DOIUrl":"https://doi.org/10.1109/ITCA52113.2020.00047","url":null,"abstract":"In this paper, an algorithm of detecting abnormal behavior based on optical flow method for the automatic monitoring is proposed. By comparing the \"momentum\" of the image and the threshold, the algorithm can determine whether abnormal motion occurs or not. For improving the real-time performance, the algorithm which can be applied to real-time video detection of abnormal behavior, reduces the image resolution, sets the region of interest (ROI) and ignores the tiny changes of optical flow points. Furthermore, calculating accumulating alarm is used instead of single frame image alarm, so the misjudgment is avoided effectively. The feasibility and accuracy of the algorithm are verified through the simulation of abnormal behavior video in elevator.","PeriodicalId":103309,"journal":{"name":"2020 2nd International Conference on Information Technology and Computer Application (ITCA)","volume":"12 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115345346","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Mobile Communication Security Defense Method Based on Honeypot Technology 基于蜜罐技术的移动通信安全防御方法
Jia Xu, Yang Guo
{"title":"Mobile Communication Security Defense Method Based on Honeypot Technology","authors":"Jia Xu, Yang Guo","doi":"10.1109/ITCA52113.2020.00110","DOIUrl":"https://doi.org/10.1109/ITCA52113.2020.00110","url":null,"abstract":"In the era of industrial Internet, the development trend of digitization, networking, and intelligence has made more and more industrial control equipment that are originally in a closed environment exposed to the public Internet, facing the threat of attacks from the Internet. Moreover, honeypot is a new type of active defense technology, which attracts hackers to launch attacks by disguising as devices and systems that seem to be valuable. After capturing and analyzing the attack behavior, it understands the attack tools and methods, and guesses the attacker’s intention and motivation. Based on the utilization of an unsupervised clustering algorithm, an information classification method is proposed in the paper. First, honeypots attack behaviors are captured with high and low interaction. Then, through redirection technology, normal access requests are forwarded to the real server for processing, and abnormal accesses are forwarded to the honeypot virtual machine to deal with. Finally, by selecting traditional tools for comparative testing, the experiment proves that the algorithm proposed in the paper can well defend and monitor as well as discover the behavior and information of the above attack events.","PeriodicalId":103309,"journal":{"name":"2020 2nd International Conference on Information Technology and Computer Application (ITCA)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121902152","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on the Theoretical Framework and the Integral Framework of Community Intelligent Policing Model 社区智能警务模式的理论框架与整体框架研究
Xiaosong Tang
{"title":"Research on the Theoretical Framework and the Integral Framework of Community Intelligent Policing Model","authors":"Xiaosong Tang","doi":"10.1109/ITCA52113.2020.00117","DOIUrl":"https://doi.org/10.1109/ITCA52113.2020.00117","url":null,"abstract":"The epidemic situation of new coronavirus infection pneumonia not only causes great losses to the social and economic development of the country, but also brings many inconvenience to the people's life and work. Community epidemic prevention is the first line of defense against the epidemic, and the grass-roots police force is the main body of this line of defense and plays a great role. The outbreak of the epidemic has a profound impact on the concept of community governance and grass-roots policing model. In the post-emergency era, the community intelligent policing model is urgently established. The model should take \"1234\" as the core idea, take people, information system, community infrastructure, policy standards and so on as the constituent elements, and establish the overall structure of community intelligent policing based on ten modules to prevent and control the occurrence of major public health emergencies in the community.","PeriodicalId":103309,"journal":{"name":"2020 2nd International Conference on Information Technology and Computer Application (ITCA)","volume":"69 38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122180922","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
PDSR: Optimization of SNIP Pre-Pruning Algorithm Based On Dynamic Sparsity Rate 基于动态稀疏率的SNIP预剪枝算法优化
Jianjun Wang, Ximeng Pan, Wanqing Li, Min Zhang
{"title":"PDSR: Optimization of SNIP Pre-Pruning Algorithm Based On Dynamic Sparsity Rate","authors":"Jianjun Wang, Ximeng Pan, Wanqing Li, Min Zhang","doi":"10.1109/ITCA52113.2020.00032","DOIUrl":"https://doi.org/10.1109/ITCA52113.2020.00032","url":null,"abstract":"As a key parameter of network pruning, the sparsity rate determines the sparsity effect after network pruning, and is closely related to the complexity, accuracy and application of neural network. Therefore, the determination of neural network sparsity rate has become one of the research hotspots. After reading a large number of relevant literatures, it is found that in the process of model training, the value of sparsity rate is often set artificially according to experience. So that the sparsity rate cannot change dynamically with the change of experimental environment and data, and the accuracy of its value is difficult to determine. To solve the above problems, this paper introduces dynamic sparsity rate, optimizes the SNIP pre-pruning algorithm, and proposes the PDSR algorithm. It calculates the sparsity rate dynamically according to the connection sensitivity of weights and realizes the pre-pruning of neural networks. Experimental results on various convolutional neural networks show that compared with SNIP algorithm, the PDSR algorithm has obvious improvement in accuracy rate and operation efficiency.","PeriodicalId":103309,"journal":{"name":"2020 2nd International Conference on Information Technology and Computer Application (ITCA)","volume":"108 47","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120825616","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信