Yi Pan, Yong Zhou, He Liu, Jintao Zhang, Jiahua Wu
{"title":"Research on LatticeLSTM model based on data enhancement and self-attention mechanism","authors":"Yi Pan, Yong Zhou, He Liu, Jintao Zhang, Jiahua Wu","doi":"10.1117/12.2673458","DOIUrl":"https://doi.org/10.1117/12.2673458","url":null,"abstract":"(Named Entity Recognition, NER) and (Relation Extraction, RE) are two basic tasks in Natural LanguageProcessing, NLP). Due to the indistinguishable boundaries between entities in Chinese and the lack of obvious formal signs, Named entity recognition has always been a difficult point in the Chinese field. Although it has made good progress in Chinese, it still lacks the semantic understanding ability in special fields and the effect is not ideal. In this paper, the algorithm of deep learning and self-attention mechanism are deeply studied. By improving LatticeLSTM model and integrating self-attention mechanism, the ability to understand Chinese semantics is improved, and a small amount of labeled data is expanded by data enhancement to build a data set in a special field to complete the task of named entity recognition.","PeriodicalId":176918,"journal":{"name":"2nd International Conference on Digital Society and Intelligent Systems (DSInS 2022)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125095909","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Xiaofei Li, Zhenghao Chen, Duanmei Liu, Jingdong Zhu, Hao Sun, Yinuo Wang, Yi Li
{"title":"ANP method for comprehensive energy service level evaluation","authors":"Xiaofei Li, Zhenghao Chen, Duanmei Liu, Jingdong Zhu, Hao Sun, Yinuo Wang, Yi Li","doi":"10.1117/12.2674216","DOIUrl":"https://doi.org/10.1117/12.2674216","url":null,"abstract":"Aiming at the problem that there are many factors affecting the comprehensive energy service level and it is difficult to quantitatively analyze them, this paper proposes a comprehensive evaluation method of the comprehensive energy service level based on ANP. Firstly, a comprehensive evaluation index system of comprehensive energy service level is constructed from five aspects: management level, economic benefit, operation effect, social impact and sustainable development level. Secondly, in order to achieve comprehensive evaluation, ANP method is used to solve the corresponding weight of the proposed comprehensive energy service level evaluation index. Through case analysis, important indicators are obtained. so as to provide reference for the operation and development of future integrated energy service providers","PeriodicalId":176918,"journal":{"name":"2nd International Conference on Digital Society and Intelligent Systems (DSInS 2022)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125135570","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Parametric technology is used for the design of weaving products","authors":"Wei-Ting Li, Shahriman Zainal Abidin, S. Mokhtar","doi":"10.1117/12.2673477","DOIUrl":"https://doi.org/10.1117/12.2673477","url":null,"abstract":"Traditional craft is an important part of cultural confidence in the national cultural strategy, and cultural design is an industry with great development potential in the future. With the arrival of artificial intelligence, virtual reality technology and a new round of information technology on the Internet, the design industry has ushered in the information age, and the traditional processes are endowed with more diversified, scale and open attributes. In order to break the one-sided structure of the traditional craft products and give the modern bamboo weaving more three-dimensional space possibilities, the parametric technology can provide the changing logical structure of the new form construction of the bamboo weaving products through the parameters. This paper uses the digital transformation of traditional bamboo weaving technology to carry out the new innovative design thinking process of bamboo weaving process, Use the 3 D Rhino software combined with Grasshopper to adjust the parameters of the bamboo weaving product weaving patterns and bamboo weaving derivative products, and then fine-tune according to the specific requirements of the curve surface shape. Compared with the traditional bamboo weaving method, the parameter modeling method can make the bamboo weaving form more intelligent, and the constructed parametric structure can be more flexible and efficient for the bamboo weaving derivative and design, which provides a new design method and ideas for the development of bamboo weaving products.","PeriodicalId":176918,"journal":{"name":"2nd International Conference on Digital Society and Intelligent Systems (DSInS 2022)","volume":"370 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131612242","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on national vulnerability and climate change based on FSI","authors":"Yang Wu, Wen-He Li, Ruiying Du","doi":"10.1117/12.2673383","DOIUrl":"https://doi.org/10.1117/12.2673383","url":null,"abstract":"The issue of climate change has become a global hotspot, and more and more countries attach importance to it, especially those vulnerable countries need to master the impact of climate change on national vulnerability. The evaluation model is established to provide a quantitative analysis of vulnerability for most countries in the world. In order to make this article easier to understand, we only focus on the representative characters used in the model, while ignoring the profound mathematical theory. This paper uses 12 indicators to measure the four areas of national vulnerability. Through K-means cluster analysis of the total national vulnerability value and ranking of 180 countries in 2021, and finally, Regress function is used to establish a multivariate linear fitting model. The study found that without the impact of climate conditions and national vulnerability would be reduced. In countries with strong vulnerability, economic development and human resources are very limited to their national vulnerability. To sum up, research on national vulnerability and climate change in the region is conducive to national development and people's in-depth research on climate.","PeriodicalId":176918,"journal":{"name":"2nd International Conference on Digital Society and Intelligent Systems (DSInS 2022)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128310112","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on security architecture design of smart campus platform based on SDN and active defense technology","authors":"Zijiao Tang","doi":"10.1117/12.2673492","DOIUrl":"https://doi.org/10.1117/12.2673492","url":null,"abstract":"While big data technology accelerates the development of campus intelligence and informatization, it also makes traditional campus security defense methods difficult to meet the needs. Massive data and the complexity of operation and maintenance management also affect the informatization construction of smart campus, bringing many security risks. Research the distributed management of data based on SDN, and use the new address hopping technology to achieve the active defense of the target, and build the architecture of the security platform considering the data type. Test and verify the architecture design proposed in the study. The results show that the security platform based on SDN and active defense technology performs well in network delay improvement and throughput, and its maximum CPU load difference with the fixed port reaches 9%. The anti attack time response changes are relatively stable, the accuracy of data transmission is more than 97%, and the root mean square error of data processing is small, It improves the protection level while ensuring data security.","PeriodicalId":176918,"journal":{"name":"2nd International Conference on Digital Society and Intelligent Systems (DSInS 2022)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120960320","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Comparable studies of Dos defense mechanism","authors":"Shuo Dai","doi":"10.1117/12.2673572","DOIUrl":"https://doi.org/10.1117/12.2673572","url":null,"abstract":"Today, hacking attacks have affected countless Internet companies and users. Especially DDos attacks. Such attacks are long-lasting and cheap to launch. Currently, such defense mechanisms are not perfect, so DDos attacks have become one of the biggest threats to the global Internet environment. In response to this situation, researchers have proposed some new DDos defense mechanisms to make up for the previous vacancy. Through the experiments of the researchers, it was concluded that the performance of the newly proposed algorithm and mechanism was better than that of the previous ones. In addition, the researchers also proposed solutions based on human solvers to bypass the captcha problem. According to the research objects and research methods, this paper analyzes and classifies the collected relevant literature, aiming at summarizing and discovering possible innovation points. The experimental analyzes and reports of these literatures are then provided. In the final part of this survey, we summarize all the literature and propose research directions and recommendations.","PeriodicalId":176918,"journal":{"name":"2nd International Conference on Digital Society and Intelligent Systems (DSInS 2022)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132974817","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Guowei Zhu, Jienian Wang, Jing Li, Chang Liu, Feng Long
{"title":"Research on technology guarantee method of power system security protocol based on three-layer structure platform","authors":"Guowei Zhu, Jienian Wang, Jing Li, Chang Liu, Feng Long","doi":"10.1117/12.2673409","DOIUrl":"https://doi.org/10.1117/12.2673409","url":null,"abstract":"Power communication is an important part of power system. The security requirements of power communication include identity authentication, access control, firewall, etc. The realization of these security requirements depends on security protocols. Security protocol is an interactive protocol based on cryptosystem, which is an important guarantee for the reliability of power communication system. Through the analysis of the three-layer structure platform, this paper uses the three-layer network to build the technical guarantee method of the power system security protocol to realize the effective guarantee of the platform information, so as to provide auxiliary decision-making support for the relevant departments.","PeriodicalId":176918,"journal":{"name":"2nd International Conference on Digital Society and Intelligent Systems (DSInS 2022)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132700549","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yang Lei, Fali Tan, Song Pan, Feng Tang, Fan Yang, Yu Shen, Zhichun Yang, Jinrui Tang
{"title":"Traveling-wave-based fault location error using modal components in electric distribution systems","authors":"Yang Lei, Fali Tan, Song Pan, Feng Tang, Fan Yang, Yu Shen, Zhichun Yang, Jinrui Tang","doi":"10.1117/12.2673539","DOIUrl":"https://doi.org/10.1117/12.2673539","url":null,"abstract":"Fault-generated traveling waves of one phase conductor is usually captured and used to locate the fault position in electrical distribution system because of the cost reduction of sensors installation. This method leads to additional location error because of the propagation speed variation in the fault location procedure. In this paper, the traveling wave-based fault location error is analyzed and discussed detailed when zero-mode, aerial-mode and phase traveling wavefronts are applied in the location procedure separately. In the meantime, the refraction and reflection of the fault generated traveling waves are also analyzed to reveal the propagation attention characteristics, which would also affect the wavefront arrival time identification. The results shown that aerial-mode traveling waves are suitable to be used in electrical distribution system to reduce the locate error, approximately less than 175 meters.","PeriodicalId":176918,"journal":{"name":"2nd International Conference on Digital Society and Intelligent Systems (DSInS 2022)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133649502","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on terminal node localization in wireless sensor networks for precision agriculture","authors":"Liying Zhang, Lina Zhao, Huixiu Li","doi":"10.1117/12.2673388","DOIUrl":"https://doi.org/10.1117/12.2673388","url":null,"abstract":"This paper proposes an improved wireless sensor network node location algorithm to locate terminal nodes of ZigBee wireless network in soybean farmland. The Gaussian data screening model was used to modify the measured distance of the received signal intensity, and the strategy of introducing variogram was adopted on the basis of standard particle swarm optimization. The advantage of each variogram was applied to the population in the process of algorithm search, so that the particles could jump out of the local optimal, ensure the global search traversal ability, and obtain the precise location of sensor nodes. The comparison between the standard particle swarm positioning algorithm without correction distance and the improved positioning algorithm in this paper shows that the improved positioning method has higher accuracy.","PeriodicalId":176918,"journal":{"name":"2nd International Conference on Digital Society and Intelligent Systems (DSInS 2022)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134276171","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yanqiang Huo, Hongyu Guo, Jiaqing Yan, Wei Chen, Yuchen Tao
{"title":"A variable tolling scheme for highway tolls based on traffic forecasting","authors":"Yanqiang Huo, Hongyu Guo, Jiaqing Yan, Wei Chen, Yuchen Tao","doi":"10.1117/12.2673559","DOIUrl":"https://doi.org/10.1117/12.2673559","url":null,"abstract":"Highway variable toll collection is an important means of traffic governance in modern society. A reasonable variable tolling scheme can adjust the traffic flow through price, and further develop the bearing capacity of highway on the basis of existing infrastructure to improve its traffic efficiency and service level. In the past, the formulation of variable tolling schemes is usually based on various assumed models, which belongs to the knowledge-driven method. In this paper, a data-driven variable tolling scheme is proposed, which uses the traffic flow prediction model integrating attention mechanism, recurrent neural network and graph neural network to mine the historical traffic information data on the road. In this paper, the traffic flow information on the future road is forecasted, and the information is used to replace some assumptions of bottleneck theory which are not completely in line with the actual situation. Taking the forecast information of traffic flow as the new constraint condition of dynamic congestion pricing in bottleneck theory can help us develop a more scientific and reasonable variable tolling scheme.","PeriodicalId":176918,"journal":{"name":"2nd International Conference on Digital Society and Intelligent Systems (DSInS 2022)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133217470","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}