{"title":"QoE Evaluation Method Based on Integration of Ant Colony Algorithm and Genetic Algorithm","authors":"Ying Bao, Zhaozheng Li, Qian Wei","doi":"10.1145/3424978.3424984","DOIUrl":"https://doi.org/10.1145/3424978.3424984","url":null,"abstract":"This paper proposed a QoE evaluation algorithm based on the combination of ant colony algorithm and genetic algorithm under the mode of multipath transmission in overlay network. On the basis of the original QoE collaborative evaluation mechanism, the algorithm combined the survival of the fittest mode of genetic algorithm and the time effectiveness of ant colony algorithm to optimize the server side QoE evaluation information. So that the QoE collaborative evaluation mechanism could evaluate or predict the media service more accurately, and optimize the QoE collaborative evaluation method for media transmission service on the server side. Finally, the effectiveness and feasibility of the algorithm were verified by the high-definition streaming media service.","PeriodicalId":178822,"journal":{"name":"Proceedings of the 4th International Conference on Computer Science and Application Engineering","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123937552","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on Factors Influencing the Value of Data Products and Pricing Models","authors":"Yaqing Si, Siyao Qin, Jing Su, Mingyue Wang","doi":"10.1145/3424978.3425146","DOIUrl":"https://doi.org/10.1145/3424978.3425146","url":null,"abstract":"The article focuses on the analysis of data product value influencing factors and establishes a data product pricing model based on value factors. The research reviews the existing research on the value evaluation of data assets, and summarizes the characteristics of data products in the data product trading system based on the alliance chain [1], and then obtains factors for data product value evaluation. Combined with the dynamics and personalized requirements of data products, a value-based three-stage dynamic pricing model for data products is proposed.","PeriodicalId":178822,"journal":{"name":"Proceedings of the 4th International Conference on Computer Science and Application Engineering","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129717554","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Sentiment Analysis of Product Reviews Based on JST Model","authors":"Ruijia Lee, J. Lyu","doi":"10.1145/3424978.3425097","DOIUrl":"https://doi.org/10.1145/3424978.3425097","url":null,"abstract":"Product reviews are information that users comment after purchasing products online, and it contains user's sentiment information about the product. Considering that the e-commerce platform implements personal recommendation of products based on browsing information of product. We propose a sentiment analysis method of product reviews based on the Joint Sentiment/Topic model, which can implement the personal recommendation of products based on the sentiment orientation of product reviews. Firstly, we build a sentiment dictionary for analyzing product reviews by integrating multiple external sentiment dictionaries. Secondly, we give a method to mark the sentiment polarity of the product reviews text. It can tag the sentiment polarity of the product reviews text to generate prior knowledge for the Joint Sentiment/Topic model. Finally, we give the formula for calculating the value of sentiment orientation on product reviews based on the Joint Sentiment/Topic model. Experiments show that the proposed method can effectively obtain the sentiment orientation of product reviews, making the product recommendation of the e-commerce platform more scientific and reasonable.","PeriodicalId":178822,"journal":{"name":"Proceedings of the 4th International Conference on Computer Science and Application Engineering","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127292474","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Comparative Analysis on Few Typical Algorithms of Gesture Recognition for Human-robot Interaction","authors":"Chao Ma, Qimeng Tan, Chaofan Xu, Jingyi Zhao, Xinyu Wang, Jing Sun","doi":"10.1145/3424978.3425047","DOIUrl":"https://doi.org/10.1145/3424978.3425047","url":null,"abstract":"Human-robot interaction (HRI) is considered as one of the key techniques of space intelligence robots. Few typical features of complicated human actions need to be captured and understood accurately by intelligent robot to ensure free communication and interaction between both above in real-time, especially for identifying and tracking hand state. There are four approaches for gesture recognition, including algorithm based on Kinect V2 SDK, model-based particle swarm optimization algorithm (PSO), deep learning algorithm and gesture module based on Baidu AI platform. These have been selected to compare in the form of principle, calculating time, robustness, range, environmental adaptability and correct rate respectively. The comparative results have generalized that both the second and the third algorithm have better performance than other algorithms in the above aspects such as calculating efficiency, robustness, detecting range, external disturbance and correct ratio. Particularly, the second algorithm is not only suitable for close range, but also suitable for multi-view cases. However, the third algorithm can have better performance, but depends on precise network model and weights by introducing lots of positive and negative gesture samples.","PeriodicalId":178822,"journal":{"name":"Proceedings of the 4th International Conference on Computer Science and Application Engineering","volume":"116 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132961380","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Zheng Yang, Hang Lei, Weizhong Qian, Zehui Yan, Weiru Zeng
{"title":"A Resolution for Scalability Problem of Record Datatype Based Formal Memory Models in Coq","authors":"Zheng Yang, Hang Lei, Weizhong Qian, Zehui Yan, Weiru Zeng","doi":"10.1145/3424978.3425032","DOIUrl":"https://doi.org/10.1145/3424978.3425032","url":null,"abstract":"The formal memory model is one of the most critical components for program verification tools development. Theoretically, the record datatype based formal memory model is a type of intuitive and efficient formalization scheme. However, practical applications of record datatype based formal memory models in Coq are limited because of their scalability problem. Present work addresses this issue by defining a new multi-level table framework with modular polymorphism in Coq. First, we present polymorphic meta specifications of formal memory model and corresponding operations. Second, through the combination of polymorphic instantiation and recursive nesting of modules, we simulate the linear and tail recursion principles. With these principles, a new record type based abstract specifications of formal memory model with multi-level table structure and corresponding memory operations are constructed. Finally, we define a logic-physical memory conversion ratio to quantify the optimization of scalability, and we present a series experiments based on the ratio to certify the improvement of scalability of the optimized framework in Coq compared with conventional definitions.","PeriodicalId":178822,"journal":{"name":"Proceedings of the 4th International Conference on Computer Science and Application Engineering","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130879089","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Countermeasures Against Information Leakage Induced by Data Serialization Effects in a RISC CPU","authors":"Qi Chen, Liang Liu, Xuesong Yan, Dongyan Zhao, Yidong Yuan, Hongmei Wu, Rui Tian","doi":"10.1145/3424978.3425052","DOIUrl":"https://doi.org/10.1145/3424978.3425052","url":null,"abstract":"Side-channel attacks (SCAs) utilize the side-channel information leakage of devices to obtain sensitive information, which have become one of the most prominent threats to the security of embedded systems. Information leakage induced by data serialization effects is a critical problem in designing countermeasures against SCAs. In this paper, information leakage induced by data serialization effects in a general-purpose RISC CPU with a three-stage pipeline is studied. The side-channel analysis is based on the netlist-level simulation to guarantee a \"clean room\" environment. Based on the implementation of SCAs by using correlation power analysis (CPA) method, information leakage is significant in the CPU and the correct key is successfully guessed with the help of only tens of power traces. Three countermeasures based on software and hardware are proposed and compared with consideration of CPU security, performance and power consumption. After implementing the countermeasures, the information leakage is reduced significantly and the anti-attack ability of the CPU is improved (up to four orders of magnitude). Moreover, when the countermeasures are implemented in actual noisy environment, the CPU security will be further improved. Reasonable compromise needs to be made between the CPU security and implementation overhead to choose suitable SCA-resistant countermeasures under different conditions.","PeriodicalId":178822,"journal":{"name":"Proceedings of the 4th International Conference on Computer Science and Application Engineering","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127838385","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Strategy and Architecture Based on Big Data for Power Internet of Things","authors":"Ganghong Zhang, Chao Huo, Jinhong He, Jian Gao, Zhibin Yin, Anqin Luo","doi":"10.1145/3424978.3424999","DOIUrl":"https://doi.org/10.1145/3424978.3424999","url":null,"abstract":"Although many methods for collecting electricity data from smart terminals are available, especially for power Internet of things, alternatives have to face to the lack of effective management and analysis methods and hard technical realities for such large data. In order to solve these problems, this paper firstly, summarized the development of power Internet of things and big data, then analyzed the motivation and goals of building power Internet of things using big data technology according to the ubiquitous smart terminals applied in power areas, and illustrated the supporting technologies of big data when effectively serving the power Internet of things. Facing the challenges caused by big data in power of Internet of things, this paper proposed a strategy to handle big data that focused on cloud computing, data mining, and machine learning. In addition, we presented a basic architecture for cloud computing platforms and proposed the establishment of an operating center for power Internet of things. Possible solutions to collect data, data modeling, and data analysis and decision were proposed. We also proposed a typical forecasting system based on big data platform. For power Internet of things, taking advantage of big data and cloud computing technologies would be an effective strategy for improving decision support and analytics applied in power Internet of things. In the near future, this would be a great challenge and opportunity in power Internet of things.","PeriodicalId":178822,"journal":{"name":"Proceedings of the 4th International Conference on Computer Science and Application Engineering","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129038516","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on Spatial Lighting Based on Particle Swarm Optimization Algorithm","authors":"Ning Gao, Bo Li","doi":"10.1145/3424978.3424982","DOIUrl":"https://doi.org/10.1145/3424978.3424982","url":null,"abstract":"The development of human society is closely related to lighting. But the traditional space illumination layout, in the present age already no longer completely suits the human's illumination demand. In this paper, based on the optimization algorithm, the spatial lighting is studied. The interior space lighting model is established, the particle swarm optimization is introduced and improved to find the optimal solution. The optimal solution of illumination is obtained by the algorithm, and the spatial Bernoulli lemniscate layout is proposed. Simulation experiments are carried out to compare the traditional layout with the new one in order to achieve the goal of optimizing the lighting effect.","PeriodicalId":178822,"journal":{"name":"Proceedings of the 4th International Conference on Computer Science and Application Engineering","volume":"148 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121514718","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Vibration Status Monitoring of Machine Center Based on EMD and LTSA","authors":"Jingshu Wang, Qiang Cao, Jinghua Ma, Bin Xing","doi":"10.1145/3424978.3425082","DOIUrl":"https://doi.org/10.1145/3424978.3425082","url":null,"abstract":"As the abnormal conditions of manufacturing process seriously affect the machining performance of machine tool, the vibration signal of spindle is selected to monitor the manufacturing process of machine center. The vibration signals are decomposed by empirical mode decomposition (EMD) method, and the first five intrinsic module functions components are picked out to calculate the power spectrums. Then, the local tangential space arrangement (LTSA) method is developed for dimension reduction, and the one-dimensional feature vector indicating the vibration state is obtained. A support vector machine model is used to classify vibration states based on one-dimensional critical features of three different manufacturing processes. The classification result indicates that the EMD-LTSA method is an efficient feature extraction method for vibration status monitoring of machine tools.","PeriodicalId":178822,"journal":{"name":"Proceedings of the 4th International Conference on Computer Science and Application Engineering","volume":"195 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122518081","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Developing an Intelligent Personal Tutor to Support EFL Learning","authors":"Yunfei Du, Xianlong Su, Youwei Jiang","doi":"10.1145/3424978.3425035","DOIUrl":"https://doi.org/10.1145/3424978.3425035","url":null,"abstract":"Intelligent personal assistants are critical to facilitate EFL learning efficiency. This study developed an intelligent personal tutor called Blingbang on Microsoft's Bot Framework, aiming to address students' puzzles and evaluate speech and writing from a pedagogical perspective. By following the goal-oriented principle, it was embedded some functional modules and a specific knowledge base to understand user's utterance, detect intent within the EFL domain, decide dialogue policy, and ultimately respond feedback to users. The validity of this system was verified by an empirical study. Results show the favorable performance, especially in answering questions, made participants satisfied. The behaviors users adopted to resolve communication breakdowns include rephrasing questions, changing keywords, or eventually turning questions to the teacher.","PeriodicalId":178822,"journal":{"name":"Proceedings of the 4th International Conference on Computer Science and Application Engineering","volume":"101 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131145462","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}