Proceedings of the 4th International Conference on Computer Science and Application Engineering最新文献

筛选
英文 中文
Design and Implementation of Remote Medicine Monitoring System Based on Internet of Things 基于物联网的远程医疗监控系统的设计与实现
Lei Wang, Kunqin Li, Xianxiang Chen
{"title":"Design and Implementation of Remote Medicine Monitoring System Based on Internet of Things","authors":"Lei Wang, Kunqin Li, Xianxiang Chen","doi":"10.1145/3424978.3425128","DOIUrl":"https://doi.org/10.1145/3424978.3425128","url":null,"abstract":"Intravenous drip, commonly known as infusion, is one of the most commonly used treatment and rescue measures in clinical practice. In the process of infusion, newborns, children, adults and the elderly have different requirements for infusion speed. Patients with poor metabolism of cardiopulmonary function and renal function need special attention, because infusion speed is not only related to the patient's heart load capacity, but also affects the efficacy of drugs, and even some patients will have drug reactions due to too fast infusion dripping speed. Besides, some problems such as untimely dosing, manual control of dripping speed and inconvenient call for medical staff exist in the process of infusion. Aiming at the above problems, in this paper, a remote medical monitoring system based on STC89C52 is proposed and designed. In the ward, sensors are used to detect the liquid level and dripping speed of liquid during infusion. Through ZigBee CC2530 wireless transmission, the infusion information is sent to the nurse end to realize remote monitoring. If there is too little medicine left or the infusion dripping speed is too fast during infusion, the alarm occurred in time, and meanwhile the infusion dripping speed can be controlled. After tested, the system runs stably, and the required functions such as real-time liquid level monitoring, real-time dripping speed monitoring, intelligent dripping speed adjustment and automatic alarm can be realized, which indicates that by using this system, the problems of the traditional infusion system can be solved, which has a strong practical value.","PeriodicalId":178822,"journal":{"name":"Proceedings of the 4th International Conference on Computer Science and Application Engineering","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115682173","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Research on DDoS Attacks in IPv6 IPv6下的DDoS攻击研究
Jie Zhong, Xiangning Chen
{"title":"Research on DDoS Attacks in IPv6","authors":"Jie Zhong, Xiangning Chen","doi":"10.1145/3424978.3425020","DOIUrl":"https://doi.org/10.1145/3424978.3425020","url":null,"abstract":"With the gradual replacement of IPv4 by IPv6, Distributed Denial-of-Service (DDoS) attacks that have plagued IPv4 appear in IPv6 more or less, and affect the normal operation of IPv6. However, the current research on how to construct a secure DDoS attack defense system under ipv6 is far away from satisfactory. This paper makes a detailed analysis of DDoS attacks from the aspect of causes, specific performance, architecture, classifies DDoS attacks according to the exploited vulnerabilities and analyzes the typical attack methods respectively. At the same time, the improvements and defects of IPv6 are further studied, along with the way to defend, summarizes how to defend against DDoS attacks in IPv6 from two aspects, and analyze the advantages and disadvantages of each scheme. Finally, how to build a more secure network security defense system in IPv6 is prospected.","PeriodicalId":178822,"journal":{"name":"Proceedings of the 4th International Conference on Computer Science and Application Engineering","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129780152","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Highly Reliable Autonomous Redundancy for Automatic Control on Ground Test and Launch Facilities in Launch Site 发射场地面试验和发射设施自动控制的高可靠自主冗余
Mengyuan Li, Shanshan Xie, Nan Xiao, Litian Xiao
{"title":"Highly Reliable Autonomous Redundancy for Automatic Control on Ground Test and Launch Facilities in Launch Site","authors":"Mengyuan Li, Shanshan Xie, Nan Xiao, Litian Xiao","doi":"10.1145/3424978.3425057","DOIUrl":"https://doi.org/10.1145/3424978.3425057","url":null,"abstract":"The control systems of ground test and launch facilities in space launch sites generally include field control systems, remote control systems, field controller, emergency controller, and actuators. Unattended and remote control are gradually adopted during testing and launching. We propose the highly reliable redundancy scheme of remote automatic control. Architecture and the corresponding strategy are designed for the hierarchical redundant control of the launch site. The remote host computers of the architecture are industrial control computers configured in parallel redundancy. The slave computers are redundant programmable logic controllers (PLC). The industrial control network of the architecture consists of a double redundant backup network, which set up a double set of the emergency backup circuit. PLCs and industrial control computers communicate with the industrial Ethernet of high-speed ring optical fiber. Distributed control equipment such as field slave computers and variable-frequency drives communicate and transmit data by means of the industrial Ethernet. Relay contacts are designed as a redundant loop with two points and two lines. The scheme designs and discusses the policies and work patterns of intelligent autonomous redundancy. The paper also presents the key points of intelligent redundancy solution and reliability enhancement. The proposed intelligent redundancy scheme has been applied in China space launch sites.","PeriodicalId":178822,"journal":{"name":"Proceedings of the 4th International Conference on Computer Science and Application Engineering","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130842056","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Weighted Local Feature Vehicle Re-identification Network 加权局部特征车辆再识别网络
Linghui Li, Yan Xu, Xiaohui Zhang
{"title":"Weighted Local Feature Vehicle Re-identification Network","authors":"Linghui Li, Yan Xu, Xiaohui Zhang","doi":"10.1145/3424978.3425156","DOIUrl":"https://doi.org/10.1145/3424978.3425156","url":null,"abstract":"With the rapid development of science and technology, how to accurately identify the same vehicle under different cameras is of great significance to smart city construction. At present, most of the vehicle re-identification methods only use global features, and often neglect the local features that often play an important role in it. To overcome this problem, we propose a multi-scale feature network with an attention module to integrate global and local features. Multi-scale feature fusion to reduce the loss of information caused by network deepening obtained more feature information, and enables the network to learn multi-level feature information. The attention module can make the network pay more attention to the discriminative features of the vehicle, such as windshield stickers and scratches on the vehicle. At the same time, we weighted the local features considerations. Extensive experiments demonstrate the effectiveness of our approach and we achieve state-of-the-art results on two challenging datasets, including VeRi-776 [1-3] and VRIC [4].","PeriodicalId":178822,"journal":{"name":"Proceedings of the 4th International Conference on Computer Science and Application Engineering","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130884947","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Manufacturing State Recognition of Machine Center Based on Revised WPT and PCA 基于修正WPT和主成分分析的加工中心制造状态识别
Jingshu Wang, T. Cheng, Bin Xing, Xiaolin Hu
{"title":"Manufacturing State Recognition of Machine Center Based on Revised WPT and PCA","authors":"Jingshu Wang, T. Cheng, Bin Xing, Xiaolin Hu","doi":"10.1145/3424978.3425086","DOIUrl":"https://doi.org/10.1145/3424978.3425086","url":null,"abstract":"The abnormal manufacturing state recognition of machine center is of great significance to reduce downtime and ensure quality of productions. A revised wavelet packet transform and principal component analysis method has been developed to extract features from vibration signals of machine center. The revised wavelet packet transform employs local discriminant bases method to select optimal wavelet packet nodes. The principal component analysis is conducted for features dimensionality reduction to obtain the final features. A BP neural network is used to classify manufacturing states based on final features of three different manufacturing processes. The comparison result indicates that the revised WPT and PCA method is an efficient feature extraction method for manufacturing stage recognition of machine tools.","PeriodicalId":178822,"journal":{"name":"Proceedings of the 4th International Conference on Computer Science and Application Engineering","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125066752","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Feature Selection Strategy for Intrahospital Mortality Prediction after Coronary Artery Bypass Graft Surgery on an Unbalanced Sample 非平衡样本冠状动脉搭桥术后院内死亡率预测的特征选择策略
K. Shakhgeldyan, B. Geltser, V. Rublev, Basil Shirobokov, Dan Geltser, A. Kriger
{"title":"Feature Selection Strategy for Intrahospital Mortality Prediction after Coronary Artery Bypass Graft Surgery on an Unbalanced Sample","authors":"K. Shakhgeldyan, B. Geltser, V. Rublev, Basil Shirobokov, Dan Geltser, A. Kriger","doi":"10.1145/3424978.3425090","DOIUrl":"https://doi.org/10.1145/3424978.3425090","url":null,"abstract":"The aim of the study is to develop models of intrahospital mortality (IHM) prediction on an unbalanced sample of patients with coronary artery disease (CAD) post coronary artery bypass graft (CABG) surgery. Methods. Models for IHM prediction were built following the analysis of 866 electronic case histories based on the analysis of CAD patients, revascularized with the CABG operation. The patient cohort consisted of two groups. The first included 35 (4%) patients who died within the first 30 days after CABG, the second - 831 (96%) patients with a favorable operation outcome. We analyzed 99 factors, including the results of clinical, laboratory and instrumental studies obtained before CABG. For feature compilation, classical filtering and model selection methods were used (wrapper method). The primary drawback to applying a classical approach was the unbalanced sample as one cohort only consisted of 4% of subjects. In that case, it was not possible to apply the cross-validation procedure with three types of samples, standard quality metrics and multi-category factors. Results. Features searching approach using the multi-stage selection procedure, which combined the validation of predefined predictors, filtering methods and multifactor model development based on logistic regression, random forest (RF) and artificial neural networks (ANNs) was proposed. The models' accuracy was evaluated by a combined quality metric. RF and ANNs based models allowed not only to build more accurate forecasting tools, but also assisted in verifying five additional IHM predictors.","PeriodicalId":178822,"journal":{"name":"Proceedings of the 4th International Conference on Computer Science and Application Engineering","volume":"200 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122146392","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Nonlinear Function Optimization Based on Adaptive Genetic Algorithm 基于自适应遗传算法的非线性函数优化
Lihua Lei, Naijin Liu, Ju Zhou
{"title":"Nonlinear Function Optimization Based on Adaptive Genetic Algorithm","authors":"Lihua Lei, Naijin Liu, Ju Zhou","doi":"10.1145/3424978.3424981","DOIUrl":"https://doi.org/10.1145/3424978.3424981","url":null,"abstract":"Genetic algorithm is widely used to solve complex optimization problems especially for the optimization of multimodal function, due to the independence, strong robustness, strong global selection and global searching ability. In order to overcome the shortcomings that standard genetic algorithm has such as relatively weak local searching ability and premature convergence is prone to occur, adaptive genetic algorithm combined with nonlinear programming method is employed into the optimization process of nonlinear functions in this paper. Simulation performance shows that the algorithm can adaptively achieve the global optimal solution and obtain more optimal solution faster than traditional genetic algorithm.","PeriodicalId":178822,"journal":{"name":"Proceedings of the 4th International Conference on Computer Science and Application Engineering","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127837573","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Similarity Measurement Based on Non-linear Hash Coding 基于非线性哈希编码的相似性度量
Jinjin Zhu, Yaping Cai
{"title":"Similarity Measurement Based on Non-linear Hash Coding","authors":"Jinjin Zhu, Yaping Cai","doi":"10.1145/3424978.3425103","DOIUrl":"https://doi.org/10.1145/3424978.3425103","url":null,"abstract":"We propose an algorithm named non-linear deep hash (NLDH) to encode the object in the image into a series of compact binary codes through a structure called a non-linear hash coding module. Based on this, then, we propose a retrieval algorithm for similar images based on these binary codes in the image. This algorithm adopts the strategy from coarse-to-fine. Then the image level similarity calculation is carried out to complete the search of the most similar images. Finally, experiments were carried out on the Oxford buildings dataset and ancient painting image dataset in this paper. The experimental results show that our proposed algorithm has a higher retrieval ability than the ordinary deep hash method, and the retrieval accuracy and recall rate are greatly improved.","PeriodicalId":178822,"journal":{"name":"Proceedings of the 4th International Conference on Computer Science and Application Engineering","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121280337","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Optimal Design Method of Conv2d Operator for TensorFlow Based on FPGA Accelerator 基于FPGA加速器的TensorFlow Conv2d算子优化设计方法
Rengang Li, Hongwei Kan, Dongdong Su, Yanwei Wang, Hongbo Zhao, Peilin Tong
{"title":"An Optimal Design Method of Conv2d Operator for TensorFlow Based on FPGA Accelerator","authors":"Rengang Li, Hongwei Kan, Dongdong Su, Yanwei Wang, Hongbo Zhao, Peilin Tong","doi":"10.1145/3424978.3424987","DOIUrl":"https://doi.org/10.1145/3424978.3424987","url":null,"abstract":"Currently, TensorFlow architecture only supports CPU and GPU programming, and has not yet formed a unified support standard for FPGAs. To the best of our knowledge, when forward operators in TensorFlow specifies a new device, the backward gradient operator in the same neural network cannot use the same device, which does not comply with rules about node device allocation in TensorFlow. Therefore, we propose an improved algorithm for node device allocation based on placement mechanism and an optimization algorithm for conv2d operator based on OpenCL. The proposed improved algorithm for node device allocation makes forward and backward operators based on FPGA accelerator satisfy the node and device allocation requirements for all TensorFlow operators, and the conv2d operator optimization algorithm based on OpenCL takes full advantage of the parallel computing advantages of FPGA. Finally, this paper uses the CNN LeNet5 model and the MNIST dataset to conduct corresponding experiments. Referring to conv2d operator, based on FPGA accelerator, we implement both the forward and backward operators involved in the first four layers of the model. The experimental results show that the accuracy of the three methods is above 98%. Compared with CPU and GPU, the accuracy difference is only about five thousandths. In addition, in the case of different batch sizes, we tested the runtime of conv2d operator in the first layer of this model. The results show that when the input batch size increased to 10000, the FPGA runs 9 times faster than the CPU. It proved that we proposed an optimization solution for TensorFlow to use FPGA operators for neural network calculations.","PeriodicalId":178822,"journal":{"name":"Proceedings of the 4th International Conference on Computer Science and Application Engineering","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128426354","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Research on Forward-looking Ranging Algorithm of Missile-borne Phased Array Detector Based on Pulse Compression 基于脉冲压缩的弹载相控阵探测器前视测距算法研究
Xude Cheng, Xuedong Xue, Jing Zhang, Shuai Zhang, Jian Qin
{"title":"Research on Forward-looking Ranging Algorithm of Missile-borne Phased Array Detector Based on Pulse Compression","authors":"Xude Cheng, Xuedong Xue, Jing Zhang, Shuai Zhang, Jian Qin","doi":"10.1145/3424978.3425034","DOIUrl":"https://doi.org/10.1145/3424978.3425034","url":null,"abstract":"Aiming at the forward-looking ranging problem of phased array detectors, this paper proposes a forward-looking ranging algorithm suitable for missile-borne phased array detectors, it uses stepped pulse compression to extract the distance information from the echo signal, and it achieves high-precision and high-efficiency distance the target area for a missile-borne platform with high real-time requirements. In this paper, the forward-looking ranging model of the missile-borne detector is established, and the linear frequency modulation sub-pulse frequency stepping signal system is used as the ranging signal. Then the ranging principle of the missile-borne detector is derived from the ranging theory. Finally, the ranging algorithm was verified through simulation experiments.","PeriodicalId":178822,"journal":{"name":"Proceedings of the 4th International Conference on Computer Science and Application Engineering","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128720421","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信