The 2nd International Conference on Computing and Data Science最新文献

筛选
英文 中文
Design and Realization of Airborne AC Power Parameters Test System Based on FPGA 基于FPGA的机载交流电源参数测试系统的设计与实现
The 2nd International Conference on Computing and Data Science Pub Date : 2021-01-28 DOI: 10.1145/3448734.3450786
Qing Dong, Hongxiang Zhu, Lijun Yan
{"title":"Design and Realization of Airborne AC Power Parameters Test System Based on FPGA","authors":"Qing Dong, Hongxiang Zhu, Lijun Yan","doi":"10.1145/3448734.3450786","DOIUrl":"https://doi.org/10.1145/3448734.3450786","url":null,"abstract":"This paper is designed to test the three-phase AC power supply parameters in the airborne power system of the test flight. The three-phase AC power supply parameter test system based on FPGA is designed to collect and analyze the steady-state and transient characteristic parameters of the three-phase AC system. Functions such as calculation, data transfer, and storage. The system can be used to analyze and detect the power quality of the aircraft three-phase AC power supply system. In the flight test, the key parameters of the airborne power supply system are tested, and the design of the airborne power supply system is optimized. The system is tested by the dynamic signal analyzer on the AC power parameter test system. The distortion coefficient of the method and the standard instrument test is less than 0.5%, which meets the national military standard test requirements which has certain application value to the aircraft power system.","PeriodicalId":105999,"journal":{"name":"The 2nd International Conference on Computing and Data Science","volume":"145 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115008774","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Application of Blockchain in Construction Inspection Activities 区块链在建筑检验活动中的应用
The 2nd International Conference on Computing and Data Science Pub Date : 2021-01-28 DOI: 10.1145/3448734.3450479
Yi-Hsin Lin, S. Ho, Holly Wang, W. Hsu
{"title":"Application of Blockchain in Construction Inspection Activities","authors":"Yi-Hsin Lin, S. Ho, Holly Wang, W. Hsu","doi":"10.1145/3448734.3450479","DOIUrl":"https://doi.org/10.1145/3448734.3450479","url":null,"abstract":"Construction management is a complex and time-consuming process, and effective quality management is mandatory to ensure overall project quality. Unfortunately, current methods are cumbersome and rife with error. Therefore, the application of electronic and blockchain-based technology for autonomous inspection operations is proposed, and its advantages to auxiliary management operations are demonstrated. The application of blockchain technology in the construction industry using appropriate electronic aids can improve operational efficiency over traditional paper-based methods, thus reducing the time required by engineers and improving quality management.","PeriodicalId":105999,"journal":{"name":"The 2nd International Conference on Computing and Data Science","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115737599","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Research on Detection Algorithm of Foreign Object Debris and Small Targets in Airport Runway Based on SSD 基于SSD的机场跑道异物碎片和小目标检测算法研究
The 2nd International Conference on Computing and Data Science Pub Date : 2021-01-28 DOI: 10.1145/3448734.3450862
Qiang Gao, Ruifeng Hong, Yutong Chen, Jiaxing Lei
{"title":"Research on Detection Algorithm of Foreign Object Debris and Small Targets in Airport Runway Based on SSD","authors":"Qiang Gao, Ruifeng Hong, Yutong Chen, Jiaxing Lei","doi":"10.1145/3448734.3450862","DOIUrl":"https://doi.org/10.1145/3448734.3450862","url":null,"abstract":"The SSD algorithm is currently a widely used target detection algorithm. In view of the small size of common foreign objects on airport runways and the low accuracy of SSD processing small target objects, this paper applies feature fusion method in SSD model to construct a new small target object detection algorithm model. The accuracy of the model is detected on the self-built airport runway foreign body data set, and the detection result mAP is 5% higher than the original SSD network.","PeriodicalId":105999,"journal":{"name":"The 2nd International Conference on Computing and Data Science","volume":"1217 7","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120878541","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
COVID-19 Spread Prediction Model COVID-19传播预测模型
The 2nd International Conference on Computing and Data Science Pub Date : 2021-01-28 DOI: 10.1145/3448734.3450846
Tong Zhou, Yunxin Zhang
{"title":"COVID-19 Spread Prediction Model","authors":"Tong Zhou, Yunxin Zhang","doi":"10.1145/3448734.3450846","DOIUrl":"https://doi.org/10.1145/3448734.3450846","url":null,"abstract":"In order to improve the status quo and improve people's awareness of new crown outbreak, quantitatively studied the spread of infectious diseases COVID-19, create conditions for forecast and control the spread of infectious diseases, we according to the general law of propagation, using the mechanism analysis method to establish model, the problem of propagation of Wuhan, Shanghai and Beijing to build mathematical model, such as SIS and SIR, to describe the process of the spread of infectious disease analysis, the change rule of the number of infected forecast time of infectious disease come, to prevent the spread of infectious diseases.","PeriodicalId":105999,"journal":{"name":"The 2nd International Conference on Computing and Data Science","volume":"99 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121354274","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Research on positioning algorithm of binocular camera based on multi-media 基于多媒体的双目摄像机定位算法研究
The 2nd International Conference on Computing and Data Science Pub Date : 2021-01-28 DOI: 10.1145/3448734.3450476
Qianghua Xiong, Lei Yang, Qingqiang Chen
{"title":"Research on positioning algorithm of binocular camera based on multi-media","authors":"Qianghua Xiong, Lei Yang, Qingqiang Chen","doi":"10.1145/3448734.3450476","DOIUrl":"https://doi.org/10.1145/3448734.3450476","url":null,"abstract":"With the development of computer technology, image processing technology has become an increasing number of mature. However, the accuracy of target positioning has not reached the expectation in the case of multi-medium. Based on the binocular positioning algorithm, Aiming at the binocular positioning algorithm, this paper proposes a multi-medium binocular positioning algorithm. First, from the calibration of the camera, the internal parameters of the camera is obtained and the distortion caused by the camera is removed, and the picture is corrected. Secondly, the position of the target is detected by the YOLOv4 algorithm and the pixels of the target in the picture is obtained. Finally, through the binocular vision algorithm, camera imaging principle and the propagation characteristics of light on the interface of different medium, the spatial position of the target in the world coordinate system is obtained.","PeriodicalId":105999,"journal":{"name":"The 2nd International Conference on Computing and Data Science","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126191428","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Single Source Optimal Reachable Path Query Method for Gene Regulatory Network 基因调控网络单源最优可达路径查询方法
The 2nd International Conference on Computing and Data Science Pub Date : 2021-01-28 DOI: 10.1145/3448734.3450900
Zhaoyuan Zhang, Zhiqiong Wang, Ziheng Ding, Hanwen Wang, Keyi Liu, Weiyiqi Wang
{"title":"A Single Source Optimal Reachable Path Query Method for Gene Regulatory Network","authors":"Zhaoyuan Zhang, Zhiqiong Wang, Ziheng Ding, Hanwen Wang, Keyi Liu, Weiyiqi Wang","doi":"10.1145/3448734.3450900","DOIUrl":"https://doi.org/10.1145/3448734.3450900","url":null,"abstract":"With the in-depth study of gene regulatory network, the reconstruction technology of gene regulatory network based on gene expression data has become increasingly mature. In the study of targeted gene mapping in gene regulatory networks, querying the acting path of targeted drugs can be transformed into a process of path querying on a probability graph. On this basis, evaluating the reachable path in a probability graph requires comprehensive consideration of both path existence probability and path length. However, the existing path query method of probability graphs can only convert the probability graph into a determined graph, and then uses the query algorithm on the determined graph to query. This will lead to the path query process unable to take into account both the path existence probability and path length at the same time, thus failing to meet the needs of targeted gene mapping research. Therefore, this paper proposes an optimal path query algorithm Dual-element Optimal Reachable Path Query Algorithm (DOP) based on the gene regulatory network represented by the probability graph. The algorithm will comprehensively evaluate both the probability of the path existence and the path length to query the optimal path, providing an important reference for targeted gene mapping research.","PeriodicalId":105999,"journal":{"name":"The 2nd International Conference on Computing and Data Science","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125375420","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Operation Risk Warning of Edge Data Centers 边缘数据中心操作风险提示
The 2nd International Conference on Computing and Data Science Pub Date : 2021-01-28 DOI: 10.1145/3448734.3450883
Mingming Zhang, Yiyi Zha, Yintie Zhang
{"title":"Operation Risk Warning of Edge Data Centers","authors":"Mingming Zhang, Yiyi Zha, Yintie Zhang","doi":"10.1145/3448734.3450883","DOIUrl":"https://doi.org/10.1145/3448734.3450883","url":null,"abstract":"The equipment scale of the edge data center is relatively small, even miniature. After clustering, the operation and maintenance work is extremely complex, which is not conducive to the performance of the edge data center cluster. There are two main reasons: first, the numbers of operation and maintenance personnel can not meet the demand; second, it is difficult to grasp the operation risk of edge data center during off-site monitoring, and the maintenance efficiency of dispatchers when they go to the site is very low. The operation risk warning of edge data center is one of the important measures to exert the overall efficiency of edge computing. Its core is to analyze the operation data of edge sites, mine the operation risk, and improve the operation and maintenance capacity and efficiency of edge data center. Therefore, this paper studies four different operation risks of edge data center, and proposes corresponding operational risk early warning methods.","PeriodicalId":105999,"journal":{"name":"The 2nd International Conference on Computing and Data Science","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128265188","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimization of Computer Teaching Strategy Based on Genetic Algorithm 基于遗传算法的计算机教学策略优化
The 2nd International Conference on Computing and Data Science Pub Date : 2021-01-28 DOI: 10.1145/3448734.3450835
Yuanyuan Zhang
{"title":"Optimization of Computer Teaching Strategy Based on Genetic Algorithm","authors":"Yuanyuan Zhang","doi":"10.1145/3448734.3450835","DOIUrl":"https://doi.org/10.1145/3448734.3450835","url":null,"abstract":"The application of computer technology in the field of education has made great progress. More and more educational problems are solved by using computers. The optimization of teaching strategy is also an important link in the field of education. How to use computer technology to optimize teaching strategy to overcome the disadvantages of subjectivity and randomness of traditional optimization method is a new research aspect of computer application in the field of education. Based on this, this paper studies the optimization of computer teaching strategy based on genetic algorithm. This paper designs an evaluation mechanism of teaching strategy, and on this basis, uses genetic algorithm to optimize teaching strategy, so as to achieve the purpose of continuous evolution and optimization of teaching strategy with the change of teaching content and teaching object. At the same time, the teaching strategy optimization system based on genetic algorithm is designed and implemented. In one academic year, this paper tracks the use of the teaching strategy optimization system by the students of one or two classes in their university and their two teachers in the semester. The experimental group used the system optimization teaching strategy, while the control group did not use the optimization strategy. The results show that the average teaching performance evaluation of the experimental group is 4 points higher than that of the control group. Therefore, genetic algorithm is a kind of parallel optimization algorithm, which is very suitable for solving the problem of computer teaching strategy optimization. The optimization effect of the final generated teaching strategy meets the requirements, has high credibility and achieves good results.","PeriodicalId":105999,"journal":{"name":"The 2nd International Conference on Computing and Data Science","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128984097","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Trajectory planning of a 6R manipulator around obstacles by using SRRT* Algorithm 基于SRRT*算法的6R机器人绕障轨迹规划
The 2nd International Conference on Computing and Data Science Pub Date : 2021-01-28 DOI: 10.1145/3448734.3450853
Shugang Zhang, Bei-xuan Lyu, Yong Li, Lijun Sui, Jie Yang
{"title":"Trajectory planning of a 6R manipulator around obstacles by using SRRT* Algorithm","authors":"Shugang Zhang, Bei-xuan Lyu, Yong Li, Lijun Sui, Jie Yang","doi":"10.1145/3448734.3450853","DOIUrl":"https://doi.org/10.1145/3448734.3450853","url":null,"abstract":"Since the outbreak of COVID-19 viruses, industrial serial manipulators have become the key equipment in the anti-epidemic war, in manufacturing industry in order to reduce people but not efficiency. In order to solve the problem of robot obstacle avoidance and trajectory planning, based on the forward and inverse kinematics of robot, the robot joint space is taken as the random sampling space, and we use the SRRT* method ,and a collision free trajectory planning is proposed.","PeriodicalId":105999,"journal":{"name":"The 2nd International Conference on Computing and Data Science","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125138506","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
3D Hand Reconstruction from a RGB Image 基于RGB图像的3D手部重建
The 2nd International Conference on Computing and Data Science Pub Date : 2021-01-28 DOI: 10.1145/3448734.3450928
Hailing Wang, Jing Zhang
{"title":"3D Hand Reconstruction from a RGB Image","authors":"Hailing Wang, Jing Zhang","doi":"10.1145/3448734.3450928","DOIUrl":"https://doi.org/10.1145/3448734.3450928","url":null,"abstract":"The research on 3D hand reconstruction by images is a hot topic in computer graphics and computer vision, and it is positively related to virtual reality and augmented reality. There are many methods for 3d hand reconstruction, but most of the existing models only consider the hand pose and geometrical shape, not the delicacy of the surface of the hand. To close this gap, in this paper put forward to add hand texture modeling to the modeling of 3D hand reconstruction, especially the modeling of hand hair. The experiment results express that our method improves the 3d hand fidelity by increasing the modeling of hand hair texture.","PeriodicalId":105999,"journal":{"name":"The 2nd International Conference on Computing and Data Science","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126917116","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信