{"title":"Deep Learning Short-Term Traffic Flow Prediction Based on Lane Changing Behavior Recognition","authors":"Li Xu, Wang Kun, Li Pengfei, Xu Miaoyu","doi":"10.1109/ITCA52113.2020.00163","DOIUrl":"https://doi.org/10.1109/ITCA52113.2020.00163","url":null,"abstract":"Short term traffic flow prediction is of great significance for reasonable traffic control and easing traffic congestion. Most of the existing methods are based on the traditional time-space parameters of traffic flow or feature extraction through deep neural network to predict short-term traffic flow. With the increase of road traffic volume, the influence of lane changing behavior on short-term traffic flow is greater. Combined with deep learning and image processing technology, a deep learning short-term traffic flow prediction method based on vehicle lane changing behavior recognition is proposed. The prediction results on real data sets show that the model has high prediction accuracy.","PeriodicalId":103309,"journal":{"name":"2020 2nd International Conference on Information Technology and Computer Application (ITCA)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126661688","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Study the quantity of handling robots for picking operation considering charging","authors":"Qingxi Liu, Yisong Li","doi":"10.1109/ITCA52113.2020.00113","DOIUrl":"https://doi.org/10.1109/ITCA52113.2020.00113","url":null,"abstract":"With the gradual expansion of e-commerce business scale, the warehouse picking operation is facing the production pressure of constant delivery time and increasing business volume. Therefore, enterprises need to adjust the resource allocation in the picking operation in time according to the order changes to ensure the order production efficiency. The handling robot is one of the resources that can be flexibly adjusted and directly affect the production time in the picking operation, so this paper considers adjusting the configuration of the handling robot. Due to the high unit price of the robot and the need to charge in the process of use, the enterprise also needs to balance the production efficiency and equipment cost. In addition, scheduling other robots during robot charging will also affect the number of robots. Therefore, this paper studies the number of handling robots in the picking operation considering charging, in order to ensure the production efficiency and reduce the cost of picking operation.","PeriodicalId":103309,"journal":{"name":"2020 2nd International Conference on Information Technology and Computer Application (ITCA)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120884838","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Parameter Study on the Operation Characteristics of the Self-circulating Evaporative Cooling System for High Performance Computer","authors":"Jielu Yan, L. Ruan","doi":"10.1109/ITCA52113.2020.00052","DOIUrl":"https://doi.org/10.1109/ITCA52113.2020.00052","url":null,"abstract":"With the rapid development of high performance computer, the component power is getting higher and higher, and the density is getting denser. Then the cooling technology has become one of the core problem for the development of high performance computer. The self-circulating evaporative cooling system has the advantages of safety and efficiency. Then in this paper, parametric effect on the operation characteristics of the self-circulating evaporative cooling system for high performance computer was studied through experiment.","PeriodicalId":103309,"journal":{"name":"2020 2nd International Conference on Information Technology and Computer Application (ITCA)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126323125","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analysis of Protein in Diet vs COVID-19 with Machine Learning","authors":"Tianzhe Fang, Yuheng Shi, Beining Mu","doi":"10.1109/ITCA52113.2020.00020","DOIUrl":"https://doi.org/10.1109/ITCA52113.2020.00020","url":null,"abstract":"From the first month in 2020, the coronavirus COVID-19 has swept the whole world like a hurricane, which caused a huge number of deaths around the world. There are a lot of different kinds of research on this pandemic. Because the health diet plays an important role in our immune system, which is contributed to the defense of the virus and the recovery after the treatment, this study aims to determine the relationships between the protein quantity in food and COVID-19. To find the correlation between them, we decide to use a basic regression as an analyzing tool to deal with it. To find the relationship between the quantity of protein in diet and COVID-19, we did the investigation first to find a proper dataset and a proper machine learning model. We tried to explore and investigate whether the protein in food is related to the recovery and death rate of COVID-19. By analyzing the data, we found that there is almost no correlation between the two. It seems the quantity of the protein plays a small role in the recuperation of COVID-19, however, there are many other factors, such as other nutritional elements, people’s age, gender, and their underlying disease types, etc., which all affect their recovery status of COVID-19. We need more information for our research and update or change a more proper model for it.","PeriodicalId":103309,"journal":{"name":"2020 2nd International Conference on Information Technology and Computer Application (ITCA)","volume":"117 25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126415607","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Sketch-to-Color Image with GANs","authors":"Wenbo Zhang","doi":"10.1109/ITCA52113.2020.00075","DOIUrl":"https://doi.org/10.1109/ITCA52113.2020.00075","url":null,"abstract":"Unsupervised Learning is a trending research field of artificial intelligence, which aims to interpret and understand the hidden structure of the data. However, the development of deep learning with Generative Adversarial Networks (GANs) creates more possibilities for unsupervised learning. GAN is a category of Neural Networks, which are mostly applied to generating images. In this paper, how GAN was implemented to help with sketch-to-color translation is illustrated. In order to achieve this goal, data-preprocessing is implemented first. Then, the model is trained for 65 epochs, and the performance of the model is improved by virtue of loss functions and optimizers. In the end, a proper User Interface (GUI) is designed to have a full application, and people could turn any sketch picture they want into a colored image.","PeriodicalId":103309,"journal":{"name":"2020 2nd International Conference on Information Technology and Computer Application (ITCA)","volume":"205 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131951581","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design and Implementation of IDC Information Security System Based on Deep Security","authors":"Xiao Yu Li, Qian Bin Chen","doi":"10.1109/ITCA52113.2020.00040","DOIUrl":"https://doi.org/10.1109/ITCA52113.2020.00040","url":null,"abstract":"Based on the deep security, this paper takes the current situation of IDC business development of domestic telecom operators and the national network information security protection requirements as the background, and takes the new project of IDC information security system in a province as the source of the subject, with three purposes. Firstly, this paper investigates and studies the difficulties of domestic telecom operators in the development of IDC services; secondly, this paper looks for the combination point of IDC business transformation of telecom operators and meets the new requirements of network information security based on deep security; thirdly, taking practical projects as an example, this paper improves the transformation strategy of \"two in one\" in practice.","PeriodicalId":103309,"journal":{"name":"2020 2nd International Conference on Information Technology and Computer Application (ITCA)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128938912","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Algorithm of Detecting Abnormal Behavior Based on Optical Flow Method","authors":"Lu Yu, Yali Wang, Jie Li, Ye Tian","doi":"10.1109/ITCA52113.2020.00047","DOIUrl":"https://doi.org/10.1109/ITCA52113.2020.00047","url":null,"abstract":"In this paper, an algorithm of detecting abnormal behavior based on optical flow method for the automatic monitoring is proposed. By comparing the \"momentum\" of the image and the threshold, the algorithm can determine whether abnormal motion occurs or not. For improving the real-time performance, the algorithm which can be applied to real-time video detection of abnormal behavior, reduces the image resolution, sets the region of interest (ROI) and ignores the tiny changes of optical flow points. Furthermore, calculating accumulating alarm is used instead of single frame image alarm, so the misjudgment is avoided effectively. The feasibility and accuracy of the algorithm are verified through the simulation of abnormal behavior video in elevator.","PeriodicalId":103309,"journal":{"name":"2020 2nd International Conference on Information Technology and Computer Application (ITCA)","volume":"12 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115345346","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Mobile Communication Security Defense Method Based on Honeypot Technology","authors":"Jia Xu, Yang Guo","doi":"10.1109/ITCA52113.2020.00110","DOIUrl":"https://doi.org/10.1109/ITCA52113.2020.00110","url":null,"abstract":"In the era of industrial Internet, the development trend of digitization, networking, and intelligence has made more and more industrial control equipment that are originally in a closed environment exposed to the public Internet, facing the threat of attacks from the Internet. Moreover, honeypot is a new type of active defense technology, which attracts hackers to launch attacks by disguising as devices and systems that seem to be valuable. After capturing and analyzing the attack behavior, it understands the attack tools and methods, and guesses the attacker’s intention and motivation. Based on the utilization of an unsupervised clustering algorithm, an information classification method is proposed in the paper. First, honeypots attack behaviors are captured with high and low interaction. Then, through redirection technology, normal access requests are forwarded to the real server for processing, and abnormal accesses are forwarded to the honeypot virtual machine to deal with. Finally, by selecting traditional tools for comparative testing, the experiment proves that the algorithm proposed in the paper can well defend and monitor as well as discover the behavior and information of the above attack events.","PeriodicalId":103309,"journal":{"name":"2020 2nd International Conference on Information Technology and Computer Application (ITCA)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121902152","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on the Theoretical Framework and the Integral Framework of Community Intelligent Policing Model","authors":"Xiaosong Tang","doi":"10.1109/ITCA52113.2020.00117","DOIUrl":"https://doi.org/10.1109/ITCA52113.2020.00117","url":null,"abstract":"The epidemic situation of new coronavirus infection pneumonia not only causes great losses to the social and economic development of the country, but also brings many inconvenience to the people's life and work. Community epidemic prevention is the first line of defense against the epidemic, and the grass-roots police force is the main body of this line of defense and plays a great role. The outbreak of the epidemic has a profound impact on the concept of community governance and grass-roots policing model. In the post-emergency era, the community intelligent policing model is urgently established. The model should take \"1234\" as the core idea, take people, information system, community infrastructure, policy standards and so on as the constituent elements, and establish the overall structure of community intelligent policing based on ten modules to prevent and control the occurrence of major public health emergencies in the community.","PeriodicalId":103309,"journal":{"name":"2020 2nd International Conference on Information Technology and Computer Application (ITCA)","volume":"69 38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122180922","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"PDSR: Optimization of SNIP Pre-Pruning Algorithm Based On Dynamic Sparsity Rate","authors":"Jianjun Wang, Ximeng Pan, Wanqing Li, Min Zhang","doi":"10.1109/ITCA52113.2020.00032","DOIUrl":"https://doi.org/10.1109/ITCA52113.2020.00032","url":null,"abstract":"As a key parameter of network pruning, the sparsity rate determines the sparsity effect after network pruning, and is closely related to the complexity, accuracy and application of neural network. Therefore, the determination of neural network sparsity rate has become one of the research hotspots. After reading a large number of relevant literatures, it is found that in the process of model training, the value of sparsity rate is often set artificially according to experience. So that the sparsity rate cannot change dynamically with the change of experimental environment and data, and the accuracy of its value is difficult to determine. To solve the above problems, this paper introduces dynamic sparsity rate, optimizes the SNIP pre-pruning algorithm, and proposes the PDSR algorithm. It calculates the sparsity rate dynamically according to the connection sensitivity of weights and realizes the pre-pruning of neural networks. Experimental results on various convolutional neural networks show that compared with SNIP algorithm, the PDSR algorithm has obvious improvement in accuracy rate and operation efficiency.","PeriodicalId":103309,"journal":{"name":"2020 2nd International Conference on Information Technology and Computer Application (ITCA)","volume":"108 47","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120825616","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}