{"title":"Analysing Errors of Experimental Measurement and Theoretical Simulation of the Sun's Visual Shape","authors":"Yuanxiu Wang","doi":"10.1109/ICAA53760.2021.00120","DOIUrl":"https://doi.org/10.1109/ICAA53760.2021.00120","url":null,"abstract":"Atmospheric refraction and Special Relativity are the main reasons for the variation in visual shape of the Sun and make the Sun's visual shape always an ellipse. This paper analyses experimental errors due to an adjustment angle of the measurement camera and simulation errors due to neglecting the atmospheric influence on horizontal angle of view of the Sun and the fact that the Sun's velocity relative to the Earth is not perpendicular to the vector from the Earth to the Sun. First, the camera's adjustment angle is calculated, and the influence of the angle on experimental errors is evaluated. Second, the variation in the horizontal angle of view of the Sun, due to atmospheric refraction, is simulated through an iterative algorithm for tracing rays of light, and the influence of the angle variation on the Sun's visual shape is discussed. Finally, the fact, due to Special Relativity, that the contraction direction of the Sun's visual shape is not parallel to the CCD plane of the camera, is considered, and the maximum error due to neglecting the fact is evaluated. Results show that, for the observation point Dalian, the errors of experiment and simulation are very little and can be neglected.","PeriodicalId":121879,"journal":{"name":"2021 International Conference on Intelligent Computing, Automation and Applications (ICAA)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115122394","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On Hamiltonian Properties of Grid Graph","authors":"Yingtai Xie","doi":"10.1109/ICAA53760.2021.00009","DOIUrl":"https://doi.org/10.1109/ICAA53760.2021.00009","url":null,"abstract":"This paper addresses the problem constructing a Hamilton cycle in the grid graph. For the general grid graphs, this task is known to be NP-complete [A. Itai et.al [2]]. We propose a sufficient condition only for having a Hamilton cycle in a grid graph and a corresponding algorithm has been constructed. We generalize the result of Yingtai Xie [The Hamiltonian properties of rectangular meshes with at most two faulty nodes, Yingtai Xie 2020 J. Phys.: Conf. Ser.1646 012044].","PeriodicalId":121879,"journal":{"name":"2021 International Conference on Intelligent Computing, Automation and Applications (ICAA)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131409756","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Discussion on Improving Information Security Literacy of University Teachers","authors":"Xinge Luc, Fang Fang","doi":"10.1109/ICAA53760.2021.00144","DOIUrl":"https://doi.org/10.1109/ICAA53760.2021.00144","url":null,"abstract":"Internet changes our life, but also increases security risks. Information society needs everyone to have information security literacy. University teachers should not only make full use of the benefits of informatization, master the skills of information selection and processing, but also enhance the awareness of information security and have good information ethics. Network security and informatization complement each other. In this paper, based on the analysis of the composition of information security literacy of university teachers, aiming at the existing problems, combined with specific practical experience, the Cultivation Countermeasures are discussed.","PeriodicalId":121879,"journal":{"name":"2021 International Conference on Intelligent Computing, Automation and Applications (ICAA)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131303836","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"2021 International Conference on Intelligent Computing, Automation and Applications [Title page]","authors":"","doi":"10.1109/icaa53760.2021.00002","DOIUrl":"https://doi.org/10.1109/icaa53760.2021.00002","url":null,"abstract":"","PeriodicalId":121879,"journal":{"name":"2021 International Conference on Intelligent Computing, Automation and Applications (ICAA)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126706618","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design and Implementation of Safety Box Management System Based on Human Detection and Face Recognition","authors":"Jing Huang, Bidong Chen, Baoyu Li, Shi-long Ma","doi":"10.1109/ICAA53760.2021.00066","DOIUrl":"https://doi.org/10.1109/ICAA53760.2021.00066","url":null,"abstract":"In order to improve the security of the safety box, a safety box management system based on human body detection and face recognition is designed and implemented. The system uses Raspberry Pi as hardware device, detects whether there is anyone by human sensor, collects face data by camera for analysis, and uses the rudder to switch the safety box's door. An APP based on Face++ platform has been developed, users can register face information through this APP, update face data uploaded by users in real time, and realize the function that registered face users can open the safety box. This system has important significance for the development of face recognition-based industry.","PeriodicalId":121879,"journal":{"name":"2021 International Conference on Intelligent Computing, Automation and Applications (ICAA)","volume":"259 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124248368","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on Fault Prediction Based on Elevator Life Cycle Big Data","authors":"Jun Qiu, Leijing Yang, Chen Wang","doi":"10.1109/ICAA53760.2021.00104","DOIUrl":"https://doi.org/10.1109/ICAA53760.2021.00104","url":null,"abstract":"Fault prediction and accident prevention are the main objectives of elevator safety. Applying the big data method to the mass data generated in the whole life cycle of elevator can realize elevator fault prediction in a broad sense. Based on data collection and preprocessing of manufacturing, installation, use, maintenance, inspection and other links during the lifecycle of elevator, the elevator database was built, and the light GBM (light gradient boosting machine) decision tree algorithm was used for feature extraction, data connection, training and prediction model setting up, which could realize the elevator historical fault query of a region and the statistics of regional fault distribution, fault type, system and component, thus the elevator fault prediction could be realized.","PeriodicalId":121879,"journal":{"name":"2021 International Conference on Intelligent Computing, Automation and Applications (ICAA)","volume":"193 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116670430","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Fenghua Zhou, Xiulian Wang, Liang Yin, Lei Tao, D. Chen
{"title":"Research on the Application of Blockchain Technology: From the Perspective of Audit","authors":"Fenghua Zhou, Xiulian Wang, Liang Yin, Lei Tao, D. Chen","doi":"10.1109/ICAA53760.2021.00106","DOIUrl":"https://doi.org/10.1109/ICAA53760.2021.00106","url":null,"abstract":"As a new technology, blockchain is applied in many industries to improve the reliability of data. Blockchain technology can help to increase the trust between the two parties of transaction in economic activities, while audit arises from the lack of trust. Therefore, blockchain technology can help to tremendously promote audit reform. On the other hand, blockchain technology can ensure the absolute authenticity of financial information, change the audit mode, reduce audit risk, and improve audit efficiency. This paper focuses on studying the impact of the application of blockchain technology on the future audit reform.","PeriodicalId":121879,"journal":{"name":"2021 International Conference on Intelligent Computing, Automation and Applications (ICAA)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123008765","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Framework for Robo-advisor Based on Knowledge Fusion","authors":"X. Luo, Ke Feng, Xiaoli Fang","doi":"10.1109/ICAA53760.2021.00059","DOIUrl":"https://doi.org/10.1109/ICAA53760.2021.00059","url":null,"abstract":"This article firstly introduces the basic concepts of robo-advisor, then analyses the current situation and main problems of robo-advisors in China's capital market, and then puts forward a framework for robo-advisor based on knowledge fusion, and finally describes the explainability of robo-advisors.","PeriodicalId":121879,"journal":{"name":"2021 International Conference on Intelligent Computing, Automation and Applications (ICAA)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124998192","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"ICAA2021 Committee","authors":"","doi":"10.1109/icaa53760.2021.00006","DOIUrl":"https://doi.org/10.1109/icaa53760.2021.00006","url":null,"abstract":"","PeriodicalId":121879,"journal":{"name":"2021 International Conference on Intelligent Computing, Automation and Applications (ICAA)","volume":"128 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123156279","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Realization Model of Personal Data Rights Based on Blockchain Technology","authors":"Jinlan Guo","doi":"10.1109/ICAA53760.2021.00113","DOIUrl":"https://doi.org/10.1109/ICAA53760.2021.00113","url":null,"abstract":"In the era of artificial intelligence, personal data is the nourishment for many artificial intelligence algorithms. Some face recognition, voice recognition and other algorithm models must be fed with personal data to bring commercial value. Therefore, various technology companies currently collect user data while providing services, and apply user data to various commercial purposes, such as precision marketing. These companies use users' personal data for revenue. However, as the owner of their own data ownership, individuals cannot obtain any benefits from it, and even in the process of data circulation, they are subject to various harassment and infringements due to personal data being leaked. Blockchain technology benefits from the application of key pairs of asymmetric encryption technology in cryptography, which can prevent data from being copied at will. It cannot only protect user privacy, but also enable personal data to circulate among various business entities, and it can also enable individuals to obtain benefits in the process of their own data circulation. This article proposes a model for the realization of personal data rights and interests based on blockchain technology. Individuals, companies or institutions with a large amount of user data, personal data account banks, personal data regulators and other parties, under the support of blockchain technology, are in their proper place, develop in benign cooperation, and share the results of data economy together.","PeriodicalId":121879,"journal":{"name":"2021 International Conference on Intelligent Computing, Automation and Applications (ICAA)","volume":"234 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123290120","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}