{"title":"Study on classfication based on data of an traditional Chinese medcine by similarity network","authors":"Xingying Zhai, Li Jiang, Bingtao Li, Guoliang Xu","doi":"10.1109/ICCEIC51584.2020.00038","DOIUrl":"https://doi.org/10.1109/ICCEIC51584.2020.00038","url":null,"abstract":"Traditional Chinese medicine (TCM) plays an important role in the world medical system. It is believed that the treatment of specific diseases may be the result of the joint action of multiple components. It is the basic hypothesis of traditional Chinese medicine on the disease treatment that multiple ingredients work together to treat diseases. As the most important theory in the discovery of active ingredients in traditional Chinese medicine, Dose-effect relationship theory holds that the effect of drugs is related to dose. Based on this theory, biological effect can correspond to multiple active ingredients as long as they have similar rules. Therefore, it is one of the key scientific problems for the discovery of active ingredients based on dose-effect relationship to explore the change rule of active ingredients in traditional Chinese medicine. The project team put forward a scientific hypothesis that the change rule can be explored based on the correlation network of active ingredients. Based on the data detected by mass spectrometry designed with the theory of dose¬effect relationship, correlation analysis was used to analyze the correlation of ingredients, and then the correlation network was constructed with correlated ingredients. Then, ingredients were classified into different subnetwork according by clustering analysis method, and the change curve of ingredients in the subnetwork was drawn to visualize change rule of ingredients in the subnetwork, and lay the foundation for the discovery of effective components of traditional Chinese medicine.","PeriodicalId":135840,"journal":{"name":"2020 International Conference on Computer Engineering and Intelligent Control (ICCEIC)","volume":"160 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114610366","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A novel hybrid model for video salient object detection","authors":"Jinping Cai, Sheng Lin","doi":"10.1109/ICCEIC51584.2020.00059","DOIUrl":"https://doi.org/10.1109/ICCEIC51584.2020.00059","url":null,"abstract":"At present, there are a few video salient object detection models that can simulate the attention behavior in the dynamic scene. However, due to the lack of video salient object detection data sets and the camera motion interference, the existing models are insufficient to capture the overall shape and precise boundaries of targets. Hence, a new hybrid model, called NHM, connects the attention feedback network and pyramid dilated convolution module to obtain abundant spatial saliency information, then uses the saliency-shift-aware convLSTM module to learn temporal saliency information. Instead of directly feeding the attention feedback network results into the pyramid dilated convolution module, we extract feature maps of different scales from five decoder blocks and transfer them to the pyramid dilated convolution module. In this way, we could make better use of multi-scale features. Furthermore, a new hybrid loss function is proposed to obtain fine boundaries by introducing the boundary- enhanced loss. The experimental results show that the proposed model is superior or equal to the state-of-the-art models.","PeriodicalId":135840,"journal":{"name":"2020 International Conference on Computer Engineering and Intelligent Control (ICCEIC)","volume":"225 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120846426","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Distributed flocking protocol of multi-agent systems with transmission delay","authors":"Ye Cheng, Tianlong Shen, Bao Shi, Li Zhuang","doi":"10.1109/ICCEIC51584.2020.00010","DOIUrl":"https://doi.org/10.1109/ICCEIC51584.2020.00010","url":null,"abstract":"The flocking problem of multi-agent systems with transmission delay is considered in this paper. We present a distributed flocking protocol and obtain a sufficient condition for the system to experience unconditional flocking by means of Lyapunov functional method. Numerical simulations are carried out to verify our theoretical results and also show that increasing delay may decrease the convergence rate of the system.","PeriodicalId":135840,"journal":{"name":"2020 International Conference on Computer Engineering and Intelligent Control (ICCEIC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129736572","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Whale Optimization Algorithm Based on Nonlinear Weights and Single Point Crossove","authors":"Qiu Shao-ming, Liu Liang-cheng, DU Xiu-li, Z. Bin","doi":"10.1109/ICCEIC51584.2020.00042","DOIUrl":"https://doi.org/10.1109/ICCEIC51584.2020.00042","url":null,"abstract":"Focusing on the problems of slow convergence speed and low search accuracy in the whale optimization algorithm, a whale optimization algorithm with nonlinear weights and single point crossover is proposed. Firstly, the algorithm introduces a non-linear weight factor in the stage of whales surrounding prey and bubble net attack to speed up the algorithm convergence; secondly, the algorithm selects several individuals randomly in the whale population for single-point crossover to increase communication between populations and to improve the algorithm to jump out the local maximum. Finally, through 12 test functions, the improved algorithm is compared with the whale optimization algorithm, particle swarm algorithm, gray wolf optimization algorithm and the whale optimization algorithm that only uses nonlinear weights and only uses single-point crossover. The experimental results show that the improved algorithm are improved significantly both in the convergence speed and the optimization accuracy.","PeriodicalId":135840,"journal":{"name":"2020 International Conference on Computer Engineering and Intelligent Control (ICCEIC)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125427876","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The method of recognizing traffic signs based on the improved capsule network","authors":"Zhang Hao","doi":"10.1109/ICCEIC51584.2020.00012","DOIUrl":"https://doi.org/10.1109/ICCEIC51584.2020.00012","url":null,"abstract":"Traffic sign recognition is one of the urgent problems to be solved by automatic driving technology, and it is also one of the more complex problems. For the problem that the conventional convolutional neural network has not been good enough to recognize traffic signs, this paper uses an improved capsule network .The method first uses image processing to extract features of traffic signs in a complex background, remove noise, binarize traffic signs, extract the main parts, make the characteristics of traffic signs more obvious, and then input the traffic signs into the capsule network to identify. The test results on the GTSRB data set show that the improved capsule network method has an improved recognition accuracy of 2%-5% in complex scenes, which is a great improvement compared to the traditional convolutional neural network. The experimental results show that the improved capsule network method has great reference significance for the research of autonomous driving.","PeriodicalId":135840,"journal":{"name":"2020 International Conference on Computer Engineering and Intelligent Control (ICCEIC)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126369049","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Recommendation of cyber attack method based on knowledge graph","authors":"Y. Ou, Tianyang Zhou, Junhu Zhu","doi":"10.1109/ICCEIC51584.2020.00020","DOIUrl":"https://doi.org/10.1109/ICCEIC51584.2020.00020","url":null,"abstract":"The lack of correlation between the new cyber attack intelligence and the knowledge database makes it difficult for the recommendation system to recommend effective cyber attack knowledge in terms of the new security intelligence. This paper proposes an cyber attack method intelligence recommendation algorithm based on knowledge graph. Firstly, it proposes a cyber attack knowledge graph construction scheme based on four kinds of open security databases. Then, based on the idea of collaborative filtering recommendation, the meta-path is introduced to describe different relations between nodes. At last, the recommendation list could be generated by calculating the correlation score of each path with node vector. Compared with the content-based recommendation method, the effectiveness of this method is proved.","PeriodicalId":135840,"journal":{"name":"2020 International Conference on Computer Engineering and Intelligent Control (ICCEIC)","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127218610","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Improve the Mental Health of College Students by Means of Computer Network Technology","authors":"Yan Hu","doi":"10.1109/ICCEIC51584.2020.00008","DOIUrl":"https://doi.org/10.1109/ICCEIC51584.2020.00008","url":null,"abstract":"Computer network technology has become an indispensable part of people's daily life. As a group that accepts new things quickly, computer network technology has a huge impact on their daily lives. Similarly, the emergence of computer network technology has also changed the way people vent and express bad emotions. Therefore, we should combine the progress and development of the times and apply computer network technology to the work of mental health counseling for college students. This article will discuss the problems that need attention in improving the mental health of college students with the help of computer network technology, and put forward reasonable suggestions.","PeriodicalId":135840,"journal":{"name":"2020 International Conference on Computer Engineering and Intelligent Control (ICCEIC)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130438901","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Life cycle management system of infrastructure based on state awareness and intelligent warehousing","authors":"Liu Wei","doi":"10.1109/ICCEIC51584.2020.00054","DOIUrl":"https://doi.org/10.1109/ICCEIC51584.2020.00054","url":null,"abstract":"Infrastructure lifecycle management involves data perception and storage, and requires high interoperability performance. Therefore, the infrastructure lifecycle management system based on state awareness and intelligent warehousing is designed. The perception layer of the system uses sensors to collect data and stores data through the Internet of things; the data modeling layer constructs the whole life cycle model of infrastructure based on the collected data; the technical support layer and domain interface layer manage the project data and R & D process through the workflow management platform; and complete the mutual operation through the public object request agent architecture Life cycle management of existing infrastructure. Experiments show that the system can detect the infrastructure failure and has good infrastructure quality tracking function; the system has the advantages of short response time, strong stability, high fault detection accuracy and low maintenance cost.","PeriodicalId":135840,"journal":{"name":"2020 International Conference on Computer Engineering and Intelligent Control (ICCEIC)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132822276","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Billing System in Distributed Computing Environment","authors":"Jun Wen, Wang Zhang","doi":"10.1109/icceic51584.2020.00066","DOIUrl":"https://doi.org/10.1109/icceic51584.2020.00066","url":null,"abstract":"Distributed computing provides user with reliable, flexible and dynamic computing and storage services by organizing many computer resources. It is also popular for high performance and resource sharing. The significance of billing for distributed computing is to correctly measure resource utilization and charge fees for the task on distributed computing. Many companies use distributed computing to build cloud computing platforms. To provide customers with more attractive products and better services, this paper proposes a billing system for distributed cloud computing. This system mainly includes two parts, information collection and billing calculation. In the information collection, the process on each node periodically collects resource utilization of the assigned task and transmits the information to other part. In the billing calculation, this part calculates the cost based on the information collected and stores the records. This system is helpful for services providers to get more reasonable billing and for customer to control cost.","PeriodicalId":135840,"journal":{"name":"2020 International Conference on Computer Engineering and Intelligent Control (ICCEIC)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115526631","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Li, Dan Fan, Xiaowen Cao, Yan Nie, Yuhang Yang, Ye Zhang
{"title":"Design of Hover Flying Adaptive PD Controller for Four Rotor Unmanned Aerial Vehicle","authors":"A. Li, Dan Fan, Xiaowen Cao, Yan Nie, Yuhang Yang, Ye Zhang","doi":"10.1109/ICCEIC51584.2020.00060","DOIUrl":"https://doi.org/10.1109/ICCEIC51584.2020.00060","url":null,"abstract":"An adaptive PD controller design method based on model reference is proposed, which is used to control the suspension of the four rotorcraft with variable quality. The reference model is obtained by approximating the attitude angle of the hovercraft by the kinetic equation of the UAV, and a second order system is selected according to the reference model which is similar to the actual system and has the expected dynamic characteristics. Based on the method of Lyapunov’s stability theory, the parameters of the controller are determined by the error between the output of the controlled object and the output of the reference model. When the controlled object parameter changes, the adaptive mechanism adjusts the PD controller by parameter estimation so that the estimated value of the controlled object parameter can always track its actual value. The adaptive controller is compared with the conventional PD controller and the PD controller with speed limit compensation in the simulation experiment. The results show that the control signal of the controller is smaller than that of the conventional PD controller. It is faster and more stable than the PD controller with the speed limit compensation. It has better control effect on the hover of quadrotor drone.","PeriodicalId":135840,"journal":{"name":"2020 International Conference on Computer Engineering and Intelligent Control (ICCEIC)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123832054","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}