{"title":"CDAE-C: A Fully Convolutional Denoising Auto-Encoder with 2.5D Convolutional Classifier","authors":"Haolan Zuo","doi":"10.1109/TOCS56154.2022.10015922","DOIUrl":"https://doi.org/10.1109/TOCS56154.2022.10015922","url":null,"abstract":"Lung cancer, a major burden of disease causing most cancer related deaths worldwide, can be well treated with early diagnosis of malignant lung nodule using high resolution chest computed tomography. Low dose computed tomography, with lower radiation risk to patients than normal dose computed tomography, benefits the health of patients but degrades the image quality with interfering noise, which can compromise diagnostic performance. In this paper, a multi-function model is introduced that deals with both lung nodule classification and CT image noise deduction. The proposed model consists of a fully convolutional denoising auto-encoder and a 2.5D convolutional classifier and is referred as Convolutional Denoising Auto-Encoder and Classifier (CDAE-C). The training of the proposed model is conducted following a two-phase process in which CDAE is firstly trained to denoise and reconstruct low-dose CT images and then CDAE-C is trained on latent code from pretrained encoder and 3D spatial relationship of lung nodules to classify benign and malignant lung nodules. Fully convolutional structure of denoising auto-encoder ensures the model can accept and reconstruct a low-dose CT image independent of its size, which is practical and very beneficial to the 2.5D classifier as the classification work of benign and malignant lung nodules needs regions of interest cropped from whole low-dose CT images. Extracting lung nodule’s latent representation from the pretrained encoder and using 3D spatial relationship of cropped lung nodule slices, 3D embedded features of each lung nodule are constructed as input of the proposed 2.5D convolutional classifier. Experimental results indicate that CDAE’s denoising performance is of RMSEapprox0.0458 and PSNRapprox27.2004, and CDAE-C classification performance reaches recall rateapprox97.67%, AUC approx99.45% and FNRapprox2.17%. After ablation experiment, the proposed model is proved to have higher accuracy and convergence speed.","PeriodicalId":227449,"journal":{"name":"2022 IEEE Conference on Telecommunications, Optics and Computer Science (TOCS)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116049289","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Robust and Efficient Path Planning System Based on the Global Euclidean Distance Fields","authors":"Hanxiong Zhou, Xiaoli Zhang, Xiafu Peng","doi":"10.1109/TOCS56154.2022.10015998","DOIUrl":"https://doi.org/10.1109/TOCS56154.2022.10015998","url":null,"abstract":"In this paper, we propose a system for fixed-area fixed-point cruising and unknown-area exploration that combines path planning with ESDF global map construction. To build highly accurate global ESDF maps incrementally with small computational resources, we introduce two independent updating queues for inserting and deleting obstacles separately, as well as Indexing Data Structures and Doubly Linked Lists for map maintenance. An efficient and robust path planning for quadrotor UAVs based on obstacle distance and gradient information included in the global ESDF map. The path planning part includes a global path search module at the front end based on the improved A* algorithm and then a local motion trajectory optimization module at the back end based on the B-Splines. Various simulational experiments are used to validate the feasibility, efficiency, and robustness of the proposed method.","PeriodicalId":227449,"journal":{"name":"2022 IEEE Conference on Telecommunications, Optics and Computer Science (TOCS)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116805688","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Application of improved generalized predictive control for frequency control in ultrasound therapy instruments","authors":"Fenghua Shu, Jingwen Yang","doi":"10.1109/TOCS56154.2022.10016171","DOIUrl":"https://doi.org/10.1109/TOCS56154.2022.10016171","url":null,"abstract":"Aiming at the phenomenon that the output frequency and power of ultrasonic therapeutic instrument can not reach the expected result due to poor precision and resonant frequency drift after long-time use, an improved generalized predictive control algorithm was proposed to optimize the output. Based on the input and output of ultrasonic transducer, the control system model is built, and the parameters of the controlled object are identified online by the recursive augmented least square method with forgetting factor. The controller can predict the future variation trend according to the current output and compensate the current control quantity. Experimental results show that this method can compensate the output quickly, improve the control efficiency, and greatly improve the stability and anti-interference ability of the system. Compared with the traditional PID control method, the stabilization time is greatly shortened and the control accuracy is higher.","PeriodicalId":227449,"journal":{"name":"2022 IEEE Conference on Telecommunications, Optics and Computer Science (TOCS)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124817376","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yang Wang, Tianding Zhou, Chenglin Li, Zhixin Liu, Shichuang Zheng, Qingqing Liu
{"title":"Systematic Analysis of Big Data Based Machine Learning Algorithms on Various Fields","authors":"Yang Wang, Tianding Zhou, Chenglin Li, Zhixin Liu, Shichuang Zheng, Qingqing Liu","doi":"10.1109/TOCS56154.2022.10015981","DOIUrl":"https://doi.org/10.1109/TOCS56154.2022.10015981","url":null,"abstract":"Machine Learning is a basic innovation in foreseeing results in view of data. Four famous Big Data machine learning algorithms are tended to in this paper: Bayesian Decision Theory Classification, and Linear Regression. The underlying two are overseen learning algorithms, the third an independent learning algorithm, and the fourth a relationship algorithm. Advantages of machine learning integrate flexibility and adaptability differentiated and customary biostatistical methods, which makes it deployable for certain tasks, similar to bet partition, finding and gathering, and perseverance assumptions. One more benefit of machine learning algorithms is the capacity to examine assorted data types. Every methodology is broadly explored and examined. Likewise, the accentuation is placed on how the four techniques transaction with one another to rouse investigation of more strong and data-proficient algorithms. At long last, the review portrays the impediments, talks about research difficulties, and recommends future chances to propel the examination on data-proficiency in machine learning.","PeriodicalId":227449,"journal":{"name":"2022 IEEE Conference on Telecommunications, Optics and Computer Science (TOCS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129726722","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on university fire equipment management system based on RFID technology","authors":"Zirou Liu, Lin Zhu, Ting Jiang, D. Qiu","doi":"10.1109/TOCS56154.2022.10015941","DOIUrl":"https://doi.org/10.1109/TOCS56154.2022.10015941","url":null,"abstract":"With the rapid development of Radio Frequency Identification technology (RFID), more and more attention has been paid to its application. By now, colleges and universities still use the traditional manual inspection, manual records and paper archiving to carry out the inventory and inspection of fire equipment. This management model gradually reflects the shortcomings of low efficiency and ineffective supervision. To solve these shortcomings, the RFID technology is introduced into the inventory management of fire equipment and inspection management of fire equipment, and a comprehensive fire equipment management system is built. By putting RFID electronic tags on fire equipment, the equipment has the perception ability, and by scanning related equipment to achieve automatic collection and automatic identification; Through WIFI/GPRS technology to achieve wireless data transmission, remote data management based on Web technology; Combined with the characteristics of daily inspection, inventory, supervision and other tasks of fire equipment, this paper designed and developed a set of intelligent management system of fire equipment based on RFID, which is an innovative research and application of RFID technology in the field of fire protection.","PeriodicalId":227449,"journal":{"name":"2022 IEEE Conference on Telecommunications, Optics and Computer Science (TOCS)","volume":"192 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128357742","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on remote intelligent monitoring system based on MQTT and LoRa communication for the five-axis NC machine tool","authors":"Lei Xie, Bing Xie, Yuming Qi","doi":"10.1109/TOCS56154.2022.10016059","DOIUrl":"https://doi.org/10.1109/TOCS56154.2022.10016059","url":null,"abstract":"Intelligent manufacturing has become a research hotspot, as the development direction of the new generation manufacturing system. CNC machine tools are the core manufacturing equipment of discrete manufacturing enterprises, however the traditional remote monitoring method for five-axis CNC machine tools has some problems, such as access latency, short coverage distance, low utilization rate of equipment, and so on. To solve this problem, this study proposed a remote intelligent monitoring system based on MQTT and LoRa communication for five-axis CNC machine tool. And the system integrates multi-source sensor signals of CNC machine tools to conduct synchronous real-time monitoring, interface control and fault alarm for multiple five-axis CNC machine tools. The results show that the system can monitor the functions and production process status of five-axis CNC machine tools within 3km based on MQTT and LoRa communication, and remotely realize the linkage control and real-time monitoring of multiple NC machining equipment by publishing and subscribing the status information of machine tools in real time.","PeriodicalId":227449,"journal":{"name":"2022 IEEE Conference on Telecommunications, Optics and Computer Science (TOCS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129600904","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on Motor Drive Control Strategy of Electric Vehicle","authors":"Ziqi Shen, Zhenpeng Luo, Siqing Zhang, Shuyu Wang","doi":"10.1109/TOCS56154.2022.10016123","DOIUrl":"https://doi.org/10.1109/TOCS56154.2022.10016123","url":null,"abstract":"The influence of external factors on electric vehicle drive motor, drive system and driving analyzed. The simulation model of electric vehicle drive motor system is built based on MATLAB/Simulink simulation platform. Three control modes are used for vehicle starting: constant torque control, constant power control and speed control. In addition, four braking modes are designed for EV. The simulation results verify the correctness and effectiveness of the control strategy for EV drive motor.","PeriodicalId":227449,"journal":{"name":"2022 IEEE Conference on Telecommunications, Optics and Computer Science (TOCS)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127151040","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A music recommendation system based on collaborative filtering and SVD","authors":"Yu-Chuan Chen","doi":"10.1109/TOCS56154.2022.10016210","DOIUrl":"https://doi.org/10.1109/TOCS56154.2022.10016210","url":null,"abstract":"With the development of the Internet and the advent of music-streaming platforms, a large amount of music data available for selection is now greater than ever on the Internet. In addition to searching expected music objects for users, it becomes necessary to develop a recommendation service. A music recommendation system (MRS) relieves users from sorting through the various options by automatically recommending music based on their historical behaviors like the play count of each song. Recommender systems have aroused a lot of awareness in the past decade. Although algorithms including content-based, collaborative, singular value decomposition, and other techniques are used in the recommendation system, there does not exist any perfect recommendation system that can give completely precise feedback on what users actually want. To figure out which algorithm does a better job, the paper proposes a music recommendation system based on two algorithms, item-based collaborative filtering, and singular value decomposition, that are used in the music recommendation system and compares the two methods to find out which one can make a more precise recommendation. Item similarity between the songs listened by the user and other users is used to predict which songs are preferred by the user. In this paper, D-Recall is regarded as an evaluation indicator between the two algorithms. And the performance of SVD is better than item-based collaborative filtering on the recommendation.","PeriodicalId":227449,"journal":{"name":"2022 IEEE Conference on Telecommunications, Optics and Computer Science (TOCS)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127158890","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Hui Li, Lei Zhu, Shijie Sun, Ke Xie, Jiabing Wang, Dong Liang
{"title":"Design of Intelligent Lock Based on Face Recognition","authors":"Hui Li, Lei Zhu, Shijie Sun, Ke Xie, Jiabing Wang, Dong Liang","doi":"10.1109/TOCS56154.2022.10016188","DOIUrl":"https://doi.org/10.1109/TOCS56154.2022.10016188","url":null,"abstract":"Aiming at the problems of weak anti-theft effect and the single function of anti-theft system, the paper designs intelligent lock based on face recognition, which combined with wireless transmission, image recognition, environmental detection and other technologies, in order to achieve remote real-time image transmission, mobile phone remote control, face recognition, environmental detection and other functions.","PeriodicalId":227449,"journal":{"name":"2022 IEEE Conference on Telecommunications, Optics and Computer Science (TOCS)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127352593","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Security Measurement and Protection Technology Based on Power Internet of Things Terminal","authors":"Caiwei Guo, Yuxiang Cai, Wen Ji, Qimin Xiao, ShuLin Wu, Weitao Zheng, Wei Zhou, Taining Huang, Jianxiong Huang","doi":"10.1109/TOCS56154.2022.10016113","DOIUrl":"https://doi.org/10.1109/TOCS56154.2022.10016113","url":null,"abstract":"As the bottom edge device of the information system, the terminal equipment of the power IoT directly realizes the functions of measurement, monitoring and control of the physical system and the environment. It is the key node of the closed loop of the information physical system. Once attacked, the resulting The consequences of information theft and information destruction are very serious. For this reason, the engineering community has begun to study the security of IoT business interaction terminals, and thus the security measurement and protection technology of IoT terminals has been produced. This paper designs the three-layer logic architecture and security protection function modules of the power IoT security protection system, and tests the defense capabilities of the block cipher mathematical model, data security protection technology and IC card application technology against malicious attacks on power data.","PeriodicalId":227449,"journal":{"name":"2022 IEEE Conference on Telecommunications, Optics and Computer Science (TOCS)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132425554","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}