2022 Second International Conference on Advanced Technologies in Intelligent Control, Environment, Computing & Communication Engineering (ICATIECE)最新文献
{"title":"Evaluation of Rural Revitalization based on Projection Pursuit Model","authors":"Yang Kangxian","doi":"10.1109/ICATIECE56365.2022.10047625","DOIUrl":"https://doi.org/10.1109/ICATIECE56365.2022.10047625","url":null,"abstract":"Under the background of closely adhering to the connotation of Rural Revitalization Strategy, this paper constructs the Rural Revitalization evaluation index system, and uses the projection pursuit model of real coded accelerated genetic algorithm to calculate the Rural Revitalization development level of China's provinces (autonomous regions and municipalities directly under the central government). The results show that industrial prosperity is the biggest restrictive factor to realize rural revitalization at present; The level of Rural Revitalization and development has three characteristics: significant regional differences, unbalanced development between coastal and inland areas, and positive correlation with the level of economic development; The five general requirements are an organic whole, interrelated and inseparable; According to the results of cluster analysis, the Rural Revitalization level of China's provinces (autonomous regions and municipalities directly under the central government) is divided into four levels. Based on this, the re-search conclusions and relevant suggestions are drawn, so as to better promote the all-round revitalization of rural areas.","PeriodicalId":199942,"journal":{"name":"2022 Second International Conference on Advanced Technologies in Intelligent Control, Environment, Computing & Communication Engineering (ICATIECE)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123947839","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Construction of Computer Big Data Security Technology Platform Based on Artificial Intelligence","authors":"Yu Miao","doi":"10.1109/ICATIECE56365.2022.10046707","DOIUrl":"https://doi.org/10.1109/ICATIECE56365.2022.10046707","url":null,"abstract":"Artificial technology developed in recent years. It is an intelligent system that can perform tasks without human intervention. AI can be used for various purposes, such as speech recognition, face recognition, etc. AI can be used for good or bad purposes, depending on how it is implemented. The discuss the application of AI in data security technology and its advantages over traditional security methods. We will focus on the good use of AI by analyzing the impact of AI on the development of big data security technology. AI can be used to enhance security technology by using machine learning algorithms, which can analyze large amounts of data and identify patterns that cannot be detected automatically by humans. The computer big data security technology platform based on artificial intelligence in this paper is the process of creating a system that can identify and prevent malicious programs. The system must be able to detect all types of threats, including viruses, worms, Trojans and spyware. It should also be able to monitor network activity and respond quickly in the event of an attack.","PeriodicalId":199942,"journal":{"name":"2022 Second International Conference on Advanced Technologies in Intelligent Control, Environment, Computing & Communication Engineering (ICATIECE)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123971359","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Application Analysis of Virtual and Augmented Reality In Modern Drama, Film and Television","authors":"Yan Zhang","doi":"10.1109/ICATIECE56365.2022.10047003","DOIUrl":"https://doi.org/10.1109/ICATIECE56365.2022.10047003","url":null,"abstract":"The impact of digital information technology on drama, film and television art is comprehensive and profound. This impact is mainly carried out through two channels: first, drama, film and television technology continues to develop and act on drama, film and television art; The second is the change of digital information technology to human social life, and then act on drama, film and television art. This change includes the change of material conditions, the change of natural social environment and the change of human spiritual world, which promotes the emergence of new film and television works. Therefore, the impact of digital information technology on drama, film and television art not only has an impact on the form of drama, film and television art works, but also has a profound impact on the content of drama, film and television art works. In addition, digital information technology has also played a decisive impact and role in today's drama, film and television art communication. This paper analyzes the promotion of digital information technology to the development of drama, film and television art.","PeriodicalId":199942,"journal":{"name":"2022 Second International Conference on Advanced Technologies in Intelligent Control, Environment, Computing & Communication Engineering (ICATIECE)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130396253","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Developmentof Noninvasive Continuouspatient Glucose Bottle Level and Health Care Monitoring System Using IoT","authors":"Sangeetha T, S. R, Shinega P A, S. G","doi":"10.1109/ICATIECE56365.2022.10047490","DOIUrl":"https://doi.org/10.1109/ICATIECE56365.2022.10047490","url":null,"abstract":"Most of senior-matured people taking bed treatment are experiencing a deficiency of state of being, an abrupt medical problem. Old individuals require constant medical services checking while in bed therapy, which can fundamentally affect their wellbeing in the event that help isn't given promptly. A remote correspondence framework is planned and produced for far off quiet observing in this technique. It incorporates temperature sensors, a tension sensor, an engine unit, and a connection point with the Node MCU for checking a patient's wellbeing. In light of sensor esteem low or high, the glucose bottle was opened and shut by means of an associated engine unit for a patient glucose level. The information from sensors is conveyed by means of Internet network based distributed computing. Patient development activities, for example, low strain and high temperature, will be saved in the information base and handled prior to being gotten back to the client organizes, web server through Arduino UNO. The normal result is saved structure basic circumstances to make a brief move to keep more established individuals from getting appropriate medical services. This IOT (Internet of Thing) innovation gathers information from a patient and feeds into two separate points of interaction that show the patient's boundaries and subtleties and dissect the basic information to an electronic server, got to by the specialist through an application that has been used.","PeriodicalId":199942,"journal":{"name":"2022 Second International Conference on Advanced Technologies in Intelligent Control, Environment, Computing & Communication Engineering (ICATIECE)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126268136","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design of Psychological Teaching Platform Based on 5G Network","authors":"Zhimin Yi","doi":"10.1109/ICATIECE56365.2022.10046825","DOIUrl":"https://doi.org/10.1109/ICATIECE56365.2022.10046825","url":null,"abstract":"Ideological and political education is based on BB network teaching platform. This is a learning system developed by bb education group, which is composed of more than 20 companies in different fields such as education, culture and sports. The platform aims to provide students with an opportunity to study at home or in their spare time, and allow them to learn from a variety of sources, including lectures, online courses and multimedia materials. The ideological education system (ies) provides students with various resources to help them understand ideological issues related to society and politics.","PeriodicalId":199942,"journal":{"name":"2022 Second International Conference on Advanced Technologies in Intelligent Control, Environment, Computing & Communication Engineering (ICATIECE)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121494889","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
T. Kalaiselvi, P. Palanivel, R. Niventhra, R. Praneshkumar
{"title":"Covid-19 Indoorsafety Monitoring System Using Machine Learning","authors":"T. Kalaiselvi, P. Palanivel, R. Niventhra, R. Praneshkumar","doi":"10.1109/ICATIECE56365.2022.10047058","DOIUrl":"https://doi.org/10.1109/ICATIECE56365.2022.10047058","url":null,"abstract":"The covid-19 epidemic is causing a world pandemic crisis. The powerful device in these situations is to wear a mask in public entry, schools, and super markets to reduce the Covid-19 spread. There are many convolutions face recognition technologies to distinguish effective images for monitoring the discovery of a face mask. Therefore, it is very important to improve the effectiveness of the acquisition methods available in the existing system. The data set value increases in the proposed input to improve the maximum accuracy. The proposed method is used to determine body temperature, face mask, and social retention using advanced machine learning methods. Using the EM8RFID scanner personal data such as temperature value, face mask identification and public distance detection are collected. It is used to indicate the state of human health in a cloud platform. A wireless heat sensor issued to determine a person's body temperature using MLX90614 without anyone. The Raspberry integrated with the pi camera is used in detecting a face mask and a social distance. Raspberrypi captures the image and detects with the convolution neural network algorithm verifying a person is wearing a face mask, following social distance. Therefore, authorities should monitor the human condition in the cloud platform area. By applying this concept, the spread of Covid-19 can be greatly reduced and it is easier to identify peoplewith Covid-19symptoms.","PeriodicalId":199942,"journal":{"name":"2022 Second International Conference on Advanced Technologies in Intelligent Control, Environment, Computing & Communication Engineering (ICATIECE)","volume":"408409 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123369820","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
K. Gunasekaran, D. Regan, Basavaraj G. Kudamble, M. A. Manivasagam
{"title":"Selection of Trust Nodes for Efficient Data Transmission in MANET","authors":"K. Gunasekaran, D. Regan, Basavaraj G. Kudamble, M. A. Manivasagam","doi":"10.1109/ICATIECE56365.2022.10046746","DOIUrl":"https://doi.org/10.1109/ICATIECE56365.2022.10046746","url":null,"abstract":"Reliable Routing through Trust Node Selection scheme is proposed to implement improved security measures and efficient routing in MANET. The friend list is created for each and every node and this task is performed for identifying the node ratings through the challenging process for its neighbor nodes. Challenge is a process carried out for determining the ratings obtained for nodes to prove their integrity and honesty. The node challenge process is carried between the nodes through the count of control messages that have been processed. From the consequences of node ratings if the nodes achieve a certain value then the nodes come under the friend node list else the node falls under the unfriend node list and isolates from the routing process. Finally, the data transmission is done through reliable and trusted routes by utilizing a key management model for encrypting the data. Recreation investigation is supported obtainable intended for demonstrating the effectiveness of the future outline.","PeriodicalId":199942,"journal":{"name":"2022 Second International Conference on Advanced Technologies in Intelligent Control, Environment, Computing & Communication Engineering (ICATIECE)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115273581","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design of English Teaching System Based On KMean Clustering Algorithm","authors":"Song Gao, Cundong Feng, Yuan Feng","doi":"10.1109/ICATIECE56365.2022.10047138","DOIUrl":"https://doi.org/10.1109/ICATIECE56365.2022.10047138","url":null,"abstract":"With learning through network has become an important way of autonomous learning. In the continuous improvement of College Students' English level, the traditional English teaching model cannot adapt to modern college English teaching. In view of this, the author constructs an English network teaching model based on basic web platform English learners and under the guidance of advanced theories and methods. This paper analyzes the tools and guiding ideology needed in the design of Higher Vocational on K-means clustering algorithm; On this basis, according to the characteristics and the actual needs of students, the design idea is obtained, the platform is constructed, and each module is designed and developed. The platform provides students with learning resources, online communication, online evaluation and information release functions; It provides teachers with the functions of uploading courseware resources, publishing homework, correcting students' last homework, and so on. Finally, the results and shortcomings of this platform are summarized. It also puts forward the objectives of the work to be done in the future and looks forward to the future research.","PeriodicalId":199942,"journal":{"name":"2022 Second International Conference on Advanced Technologies in Intelligent Control, Environment, Computing & Communication Engineering (ICATIECE)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131670331","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Sports Image Classification and Application based on SIFT Algorithm","authors":"Bin Yang","doi":"10.1109/ICATIECE56365.2022.10047818","DOIUrl":"https://doi.org/10.1109/ICATIECE56365.2022.10047818","url":null,"abstract":"The research on moving image classification and application based on SIFT algorithm is an important research work. This is the first time to conduct this type of research in the field of computer vision. SIFT algorithm is a method for finding key points in an image. It works by finding edges that are similar to each other and then identifying the relationship between them. The more similar two images are, the closer they are on the image. The main purpose of this study is to develop a model that can classify moving images with high accuracy and low computational cost. This method uses SIFT feature descriptor to divide sports images into four categories: football, basketball, volleyball and football. This method has been tested with other standard methods.","PeriodicalId":199942,"journal":{"name":"2022 Second International Conference on Advanced Technologies in Intelligent Control, Environment, Computing & Communication Engineering (ICATIECE)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130770304","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Simulation and Optimization of Battery Management System Using MATLAB Simulink","authors":"Asra Ahmad, Antyoday Kumar, Kamlesh Pandey, P. Tiwari, Jagrat Singh Rana, Kshitij Dilip Wankhade","doi":"10.1109/ICATIECE56365.2022.10047579","DOIUrl":"https://doi.org/10.1109/ICATIECE56365.2022.10047579","url":null,"abstract":"The fate of renewable batteries depends almost completely on fabrication, controlling and checking of the battery packet or battery and its related frameworks. Batteries are favorable storage tool for fixed utilization due to their development and the forthrightness with which they designed and introduced contrasted with different innovations. The Battery management system widely known as the BMS is the chief of any battery driven gadget. The BMS permits new working methodologies impractical with ordinary battery frameworks. Battery wellbeing is a significant worry, because of an enormous number of catastrophes, for which short circuits has been accounted as one of the fundamental roots. Hence diagnosing and forecasting short circuits are of incredible importance to upgrade security of any electric driven device. The motivation behind the BMS is to ensure protected and dependable battery activity. The battery management system (BMS) is a basic segment of any electric gadgets like cell phones, laptop PCs, electric vehicles etc. To keep up the wellbeing and dependability of the battery, state checking and assessment, cell balancing, and charge control are components that have been applied in BMS. To control battery execution and wellbeing, it is essential to fathom what should be controlled and why it is essential to be controlled. This paper is about basics of battery management system, its objective, its components and future enhancements that can be made.","PeriodicalId":199942,"journal":{"name":"2022 Second International Conference on Advanced Technologies in Intelligent Control, Environment, Computing & Communication Engineering (ICATIECE)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130989392","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}