Proceedings of the 2022 7th International Conference on Intelligent Information Technology最新文献

筛选
英文 中文
Application of Digital Information Technology to the Quality Management System of Power Grid Engineering 数字信息技术在电网工程质量管理体系中的应用
Xiangbiao Leng, G. Zou, Haixiang Yu, Fei Peng, Huanghai Feng, Bing-Ze Huang
{"title":"Application of Digital Information Technology to the Quality Management System of Power Grid Engineering","authors":"Xiangbiao Leng, G. Zou, Haixiang Yu, Fei Peng, Huanghai Feng, Bing-Ze Huang","doi":"10.1145/3524889.3524905","DOIUrl":"https://doi.org/10.1145/3524889.3524905","url":null,"abstract":"The construction quality of the power grid determines whether it can operate safely and reliably. Therefore, in order to improve the construction quality of power grid projects, three technologies, GIS technology, BIM technology, and Internet of Things technology, are introduced in the article. At the beginning of this article, the author started research on the application of the three technologies in the process of power grid construction, and concluded that the application of the three technologies can greatly reduce the input of manpower and material resources, save costs, improve the efficiency of power grid construction, and can also improve the management and control efficiency of power grid construction quality. Finally, the author looks forward to the development of the three technologies by analyzing the future development trend of informatization.","PeriodicalId":129277,"journal":{"name":"Proceedings of the 2022 7th International Conference on Intelligent Information Technology","volume":"174 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115758319","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Accessibility Design of Senior Products Based on Interactive Genetic Algorithm 基于交互式遗传算法的高级产品可访问性设计
Youlian Chen, Rilong Huang
{"title":"Accessibility Design of Senior Products Based on Interactive Genetic Algorithm","authors":"Youlian Chen, Rilong Huang","doi":"10.1145/3524889.3524895","DOIUrl":"https://doi.org/10.1145/3524889.3524895","url":null,"abstract":"With the development of social science and technology and the improvement of living standards, people's demand for products is more and more focused on user experience and human-computer interaction. Interactive Genetic Algorithm is an intelligent evolutionary method that uses the subjective evaluation value of human as the individual adaptation value. The purpose of this paper is to investigate the accessibility design of senior products based on Interactive Genetic Algorithm. In this paper, we mainly improve the interactive genetic algorithm and improve it based on the hesitation system, and then use this improved algorithm for the accessibility design of elderly products, and conduct a research on the needs of elderly people nowadays, the research results indicate that most of the elderly people have been exposed to walking aids, but due to the inadequacy of the product itself and the fact that many of them do not realize the usefulness of the product, there is still a demand for such products among some of those who have not used them.","PeriodicalId":129277,"journal":{"name":"Proceedings of the 2022 7th International Conference on Intelligent Information Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116690959","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Calculation of Position for Odd Numbers to Change Length in Valuated Binary Tree 赋值二叉树中奇数改变长度位置的计算
Xueting Han, Kongfeng Zhu
{"title":"Calculation of Position for Odd Numbers to Change Length in Valuated Binary Tree","authors":"Xueting Han, Kongfeng Zhu","doi":"10.1145/3524889.3524906","DOIUrl":"https://doi.org/10.1145/3524889.3524906","url":null,"abstract":"The paper first investigates the node in tree on how the length of digits changes when the node is in decimal expression and presents a method to calculate the position where the number of digits is changed. Several formulas are proved with detailed mathematical reasoning. The paper then demonstrates application of the method in analyzing big integers such as the RSA numbers. An example to analyze RSA-155 is exhibited to make readers have a more concrete understanding of the method. Experiments show the method is helpful to reduce searching time when searching for a data set of numbers with equal length.","PeriodicalId":129277,"journal":{"name":"Proceedings of the 2022 7th International Conference on Intelligent Information Technology","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131928640","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Hybrid Single Board Computer System for Unmanned Ground Vehicle 无人地面车辆混合单板计算机系统
M. M. Ahmad, Kiran Ahuja, A. Nayyar
{"title":"Hybrid Single Board Computer System for Unmanned Ground Vehicle","authors":"M. M. Ahmad, Kiran Ahuja, A. Nayyar","doi":"10.1145/3524889.3524907","DOIUrl":"https://doi.org/10.1145/3524889.3524907","url":null,"abstract":"The single-board computer (SBC) is a compact, powerful and cost-effective system on chip (SOC) that can perform all complex tasks that may be executed by the desktop computer. Further, with the development of the SBCs having a powerful processor and high RAM support–they are already deployed in many applications such as in agriculture, home security, automation, drones, unmanned ground vehicle (UGV) and like-wise. However, each SBC has a unique capability and therefore some SBC may perform better than others depending upon the application. Further, some SBC has high processing power but they are either costly or support fewer I/O pins. Similarly, some SBC are cost-effective, has a high number of I/O pins but they have quite less processing power for executing complex instructions and tasks. In addition, for some SBC there is no dedicated integrated development environment (IDE) available that can be used to program SBC according to the user-specific need. Due to these above-mentioned problems, the user has to either invest in the high processing power SBC (having high price) but compromise with less I/O pins or invest in the SBC (having low price) that has the high number of I/O pins but compromise with low processing power (although there are some SBCs available in the market that has high processing power along with the high number of I/O pins. But they are available at a quite high price so we are not considering these SBCs). In both cases, the user is not able to integrate intelligent high processing sensors and equip the system in which SBC is used with new features over time. To over this problem, we are introducing a smart and highly intelligent hybrid implementation of Raspberry pi model 3b+ with Arduino UNO board for controlling UGV. During testing, we have found that our developed hybrid SBC system for UGV work quite impressively. The CPU utilization and CPU temperature readings of the hybrid system are noted while performing various complex tasks on the UGV. Further during the evaluation process, it is observed that UGV consumed a maximum of 80% of system CPU utilization to perform all the allocated tasks efficiently. The rest 20% of the CPU usage as well as some of the GPIO pins of Raspberry pi are reserved and can be used to implement various complex applications in the UGV based on the user requirement.","PeriodicalId":129277,"journal":{"name":"Proceedings of the 2022 7th International Conference on Intelligent Information Technology","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133316920","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Progress in Applying Valuated Binary Tree to Factorize Big Integers 有值二叉树在大整数分解中的应用进展
Xingbo Wang
{"title":"Progress in Applying Valuated Binary Tree to Factorize Big Integers","authors":"Xingbo Wang","doi":"10.1145/3524889.3524904","DOIUrl":"https://doi.org/10.1145/3524889.3524904","url":null,"abstract":"Finding new methods to solve the hard problem of integer factorization has gone on for tens of years in cryptography but better methods are still in need. Even in the era of quantum computing, conventional approaches are necessary as a part of science researches. The method derived from valuated binary tree, which was raised in 2016, has revealed rigorous power in studying odd integers. This paper overviews the method from its origination to its achievements so as to make people know the method well. Four characteristics of symmetric property, genetic property, boundary property and connection property are introduced with their main traits. Achievements are exhibited briefly in integer factorization of both general purpose and special purpose. The paper shows that, the new method might be rigorous and prosperous in the future.","PeriodicalId":129277,"journal":{"name":"Proceedings of the 2022 7th International Conference on Intelligent Information Technology","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127195522","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Brain Connectivity Toolbox for Functional Near-Infrared Spectroscopy Data 脑连接工具箱的功能近红外光谱数据
Chunjie Zhu, Kecheng Yan, Hai-juan Huang, Dongyang Wang, Yizheng Zhang, Jinyan Sun
{"title":"A Brain Connectivity Toolbox for Functional Near-Infrared Spectroscopy Data","authors":"Chunjie Zhu, Kecheng Yan, Hai-juan Huang, Dongyang Wang, Yizheng Zhang, Jinyan Sun","doi":"10.1145/3524889.3524908","DOIUrl":"https://doi.org/10.1145/3524889.3524908","url":null,"abstract":"Functional near-infrared spectroscopy (fNIRS) is a promising and noninvasive optical functional neuroimaging method, and can also be a useful method in brain network researches. Functional connectivity and effective connectivity are two important analysis methods in brain connectionism. The available toolkits have greatly facilitated the preprocessing of fNIRS data and the task activation analysis. Nevertheless, toolkits that can assess brain activation and functional and effective connectivity simultaneously are still lacking at present. Here, we developed a brain connectivity toolbox for fNIRS data called fNIRS_AT with MATLAB. This toolbox includes the main functions of fNIRS data preprocessing, graphic plot, brain connectivity calculation, and statistical analysis. In the module of data preprocessing, NIRS light intensity can be converted into hemodynamic parameters using the differential pathlength factor (DPF) method, and the DPF values could be adjusted according to the light source wavelength and the subject's age. In the module of brain connectivity calculation, small-world properties and Granger causality are included. The brain activation and connectivity results can be statistically analyzed in the toolbox. Through the friendly graphical user interface, fNIRS_AT allows researchers to perform brain activation and connectivity analysis in an easy and flexible way. This software package will facilitate the application of NIRS in brain connectivity.","PeriodicalId":129277,"journal":{"name":"Proceedings of the 2022 7th International Conference on Intelligent Information Technology","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131270572","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Reversible Data Hiding in Encrypted Images Based on Multi-Predictor and Quad-tree Block Encoding 基于多预测器和四叉树块编码的加密图像可逆数据隐藏
Huiqi Zhang, Lin Li, Qingyan Li
{"title":"Reversible Data Hiding in Encrypted Images Based on Multi-Predictor and Quad-tree Block Encoding","authors":"Huiqi Zhang, Lin Li, Qingyan Li","doi":"10.1145/3524889.3524896","DOIUrl":"https://doi.org/10.1145/3524889.3524896","url":null,"abstract":"With the rapid development of the Internet, people's awareness of privacy protection is also gradually improved. Reversible data hiding of encrypted image is a technique that encrypts the original image and allows the embedding of secret data without knowing the original image information. This method can accurately extract the secret data and reconstruct the original image completely. In this paper, a reversible data hiding algorithm of encrypted image based on multi-predictor and quad-tree block encoding is proposed. First, the original image is divided into 8×8 non-overlapping blocks. Then, multi-predictor is used to predict each block to get the prediction error image, then block scrambling is used to encrypt it. Since the pixel values of the encrypted image are small integer closes to zero, the quad-tree block encoding method can be used to embed a large amount of data. Experimental results show that the embedding rate of this method is better than that of some new algorithms.","PeriodicalId":129277,"journal":{"name":"Proceedings of the 2022 7th International Conference on Intelligent Information Technology","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115811388","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Survey on Human Action Recognition based on Attention Mechanism 基于注意机制的人类行为识别研究综述
Hasiqidalatu Tang, Jia-xin Cai
{"title":"A Survey on Human Action Recognition based on Attention Mechanism","authors":"Hasiqidalatu Tang, Jia-xin Cai","doi":"10.1145/3524889.3524897","DOIUrl":"https://doi.org/10.1145/3524889.3524897","url":null,"abstract":"Human action recognition has always been an important challenge in the field of computer vision. Human action recognition has a good development prospect for technology applications in many fields such as artificial intelligence and behavior analysis. Based on the collected literature, this article first summarizes the data sets commonly used in the field of human action recognition, and then discusses the common methods of human action recognition based on traditional features and deep learning. Secondly, this paper reviews the principles and concepts of attention mechanism, and the types and applications of attention mechanism. Then this paper reviews the human action recognition methods based on the attention mechanism optimized in recent years and its comparison with other traditional methods on the data sets. Finally, the prospect and summary of the research on this subject are drawn.","PeriodicalId":129277,"journal":{"name":"Proceedings of the 2022 7th International Conference on Intelligent Information Technology","volume":"197 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132104653","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
An Overview of Machine Learning Methods used in Fatigue Driving Detection 疲劳驾驶检测中的机器学习方法综述
Liuqing Dong, Jiaxin Cai
{"title":"An Overview of Machine Learning Methods used in Fatigue Driving Detection","authors":"Liuqing Dong, Jiaxin Cai","doi":"10.1145/3524889.3524900","DOIUrl":"https://doi.org/10.1145/3524889.3524900","url":null,"abstract":"Fatigue driving has always been an important factor causing traffic accidents in China and the world. Fatigue driving identification has a good prospect in engineering application and behavior analysis and other fields. Based on the collected literature, this paper first discusses the concept, significance, and key points in the study of fatigue driving. Then, the method of fatigue driving detection based on deep learning and model building is discussed. After introducing the data set, the results of these methods are analyzed and compared, and the possibility of their application is discussed. Finally, this paper introduces the prospect and summary of this research.","PeriodicalId":129277,"journal":{"name":"Proceedings of the 2022 7th International Conference on Intelligent Information Technology","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115716657","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
An Optimization Meta-heuristic Algorithm Based on Segment Routing 基于分段路由的优化元启发式算法
J. Xu, Zhengyou Xia
{"title":"An Optimization Meta-heuristic Algorithm Based on Segment Routing","authors":"J. Xu, Zhengyou Xia","doi":"10.1145/3524889.3524890","DOIUrl":"https://doi.org/10.1145/3524889.3524890","url":null,"abstract":"Segment routing is a new routing paradigm that directs traffic through segment lists. Because of its ability to program detours in forwarding paths on a large scale, segment routing can better implement traffic engineering. Previous related work has been done mainly based on integer linear programming, which does not have a better strategy for coping with rapid network state changes. This work proposes an optimized local search algorithm that enables the path calculation unit (PCE) or SDN controller to quickly calculate the changed path in a short time. Moreover, we take both prefix-sid and adjacency-sid into account to achieve optimal utilization of network resources. Our experimental results show that we are able to optimize the network paths in less time than the previous algorithm, thus achieving millisecond response to network state changes.","PeriodicalId":129277,"journal":{"name":"Proceedings of the 2022 7th International Conference on Intelligent Information Technology","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134087395","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信