{"title":"Information Processing and Designing of Gas Well Drilling Fluids","authors":"XC Cao, L. L. Hua, Y. X. Jiao, C. Zhou","doi":"10.1109/APCT55107.2022.00013","DOIUrl":"https://doi.org/10.1109/APCT55107.2022.00013","url":null,"abstract":"This article introduced the information of an offshore horizontal gas well containing one main wellbore and three branch horizontal wellbores, in which formation data such as lithology, pressure and depth of different formation were included. According to these information data, we calculated wellbore structure and designed three kinds of drilling fluid system suitable for the given wellbores and those in the same developing area.","PeriodicalId":237645,"journal":{"name":"2022 Asia-Pacific Computer Technologies Conference (APCT)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130548154","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Visual analysis of research on the application of mixed reality technology in autism intervention","authors":"Xinyu Chen, Yi Lu, Yunying Chen, Wang Zhao","doi":"10.1109/APCT55107.2022.00016","DOIUrl":"https://doi.org/10.1109/APCT55107.2022.00016","url":null,"abstract":"Mixed reality technology is developed from virtual reality technology and augmented reality technology. It has great significance in the application of medical field, teacher-student interaction training and so on. Existing studies at home and abroad have explored the theory and practice of applying mixed reality technology to autism intervention, which can provide reference for future research in this field. To understand the development and current situation of mixed reality technology's application in autism intervention, this article carries on the Co-word Analysis and uses VOS viewer visualization software to analyze the hot spots and trends of relevant research in the nearly 10 years and explore the research trends, providing references and ideas for future research.","PeriodicalId":237645,"journal":{"name":"2022 Asia-Pacific Computer Technologies Conference (APCT)","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133744201","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Change Management and Data Governance","authors":"Suthashinikisan Krishnan, Zhou Shuo, D. Wong","doi":"10.1109/APCT55107.2022.00008","DOIUrl":"https://doi.org/10.1109/APCT55107.2022.00008","url":null,"abstract":"Change management is an essential and integral part of an organization in this data-driven era. This article analyzes literature reviews on change management methodologies in several domains. It is also pointed out the application of change management and data governance under big data has great theoretical and practical significance. As an industry with relatively deep application in financial technology, banking has accumulated data for a long time and large volume. A large number of external information is introduced in business management. This includes research on promising practices process and appropriate tools in change management to build a closed-loop control system of banking operations.","PeriodicalId":237645,"journal":{"name":"2022 Asia-Pacific Computer Technologies Conference (APCT)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124090174","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design and Application of Real-Time Analysis Model for Accounts Receivable Based on PowerBI","authors":"Jing Cheng, Xiaocheng Gu","doi":"10.1109/APCT55107.2022.00011","DOIUrl":"https://doi.org/10.1109/APCT55107.2022.00011","url":null,"abstract":"With the wide application of new technologies such as big data and artificial intelligence, more and more traditional industries tend to be intelligent, and the traditional enterprise financial management work is also moving toward the direction of intelligence. MicrosoftPowerBI is a data analysis and visualization tool launched by Microsoft, which can extract data from various data sources, organize and analyze the data, and then generate beautiful charts. This paper introduces the use of MicrosoftPowerBI, a business intelligence analysis tool, to build a real-time analysis model of accounts receivable, which realizes the real-time fetching, analysis and presentation of enterprise accounts receivable and helps to improve the management ability of accounts receivable of related enterprises.","PeriodicalId":237645,"journal":{"name":"2022 Asia-Pacific Computer Technologies Conference (APCT)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127966861","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Program Design and Implementation of Y Class Matrix Eigenvalue Based on Python Language","authors":"Weida Qin, Yinhu Wei, Ricai Luo","doi":"10.1109/APCT55107.2022.00022","DOIUrl":"https://doi.org/10.1109/APCT55107.2022.00022","url":null,"abstract":"Matrix eigenvalues have important applications in rice yield, collaborative filtering recommendation algorithm integrating user interests and score differences, so solving matrix eigenvalue algorithm is one of the research hotspots in the algorithm field. Dichotomy is a very important algorithm for solving matrix eigenvalues. Based on the study of solving matrix eigenvalue algorithm by experts and scholars $mathbf{Y}$ class matrix is studied. The matrix has seven pairs of adjacent two paramagnetic submatrixes, and the eigenvalues are not strictly interleaved, that is, the matrix does not meet the key properties of using dichotomy to solve the eigenvalues. By studying and analyzing the principle of sign change of characteristic polynomial sequence of sequential principal submatrix of $mathbf{Y}$ class matrix, the feasible conditions and feasibility of dichotomy algorithm for solving the eigenvalues of Y-type matrix are studied. The numerical experiment uses Python language to design the program to verify the feasibility of the algorithm.","PeriodicalId":237645,"journal":{"name":"2022 Asia-Pacific Computer Technologies Conference (APCT)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125104878","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
K. Deniswara, Steven Gunawan, Jonathan Theodore Kesuma, Michael Angelus
{"title":"Analysis of External Auditor's Perception on the Utilization of Cloud Computing in the Financial Statement Audit Process","authors":"K. Deniswara, Steven Gunawan, Jonathan Theodore Kesuma, Michael Angelus","doi":"10.1109/APCT55107.2022.00012","DOIUrl":"https://doi.org/10.1109/APCT55107.2022.00012","url":null,"abstract":"The purpose of this research is to understand the auditor's perception of cloud computing utilization in assisting audit procedures based on UTAUT Model with variables Performance expectancy, Effort expectancy, Social influence, Facilitating conditions, and Perceived Trust affect Behavioral intention. This research was conducted by quantitative method by disseminating questionnaires online on 72 samples of external auditor respondents working at the Public Accounting Firm in Jakarta. The analysis method used is PLS-SEM. This study also used moderation variables namely Gender, Age, and Experience. The results found that Performance expectancy, Facilitating conditions, and Perceived Trust influence behavioral intentions. While Effort expectancy and Social influence have no effect.","PeriodicalId":237645,"journal":{"name":"2022 Asia-Pacific Computer Technologies Conference (APCT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129579730","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Wei Wang, Lei Sun, Guoyi Zhang, Dan-Ke Hong, Hailong Zhu
{"title":"Research on Intelligent Management Scheme of Network Slicing","authors":"Wei Wang, Lei Sun, Guoyi Zhang, Dan-Ke Hong, Hailong Zhu","doi":"10.1109/APCT55107.2022.00018","DOIUrl":"https://doi.org/10.1109/APCT55107.2022.00018","url":null,"abstract":"Network slice technology can provide end-to-end virtual private networks which are logically isolated for differentiated services on the basis of the same set of network infrastructure equipment. The differentiation of business requirements, the dynamic business requirements, and the complexity of network infrastructure have brought great challenges to the on-demand customization of network slicing, and the release, redistribution of network resources. It is proposed to use the data of each service as a data set to train the sequence prediction model and the Service Level Agreement(SLA) parameter-Virtual Network Function(VNF) mapping model by distributed Artificial Intelligence(AI) to predict the traffic change of each subnet slice and the management of the slice, and then manage each subnet slice in a differentiated and intelligent pattern.","PeriodicalId":237645,"journal":{"name":"2022 Asia-Pacific Computer Technologies Conference (APCT)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129885515","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Application prospect of artificial intelligence technology in autism spectrum disorder intervention","authors":"Yi Lu, Yunyi Chen, Xinyu Chen, Wang Zhao","doi":"10.1109/APCT55107.2022.00019","DOIUrl":"https://doi.org/10.1109/APCT55107.2022.00019","url":null,"abstract":"[purpose/meaning] with the rapid development of artificial intelligence technology, in order to understand the artificial intelligence technology application in the field of autism spectrum disorder intervention, as well as the research focus and research tendency, in this paper, the nearly in accordance with the relevant article retrieval type retrieval of literature analysis, the abstract and key words to analysis of artificial intelligence technology in intervention in autism research direction. [Method/process] Using WOS database as data source, relevant literatures were retrieved by using correlation retrieval method, and the abstract and keywords of literatures were analyzed. [Conclusion] Children are the main group concerned by this application, while simulation robot and virtual reality are the main technologies and applications of artificial intelligence.","PeriodicalId":237645,"journal":{"name":"2022 Asia-Pacific Computer Technologies Conference (APCT)","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127509199","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Survey of State of the Art on Rumor Detection in Social Network","authors":"Yong Xu, Xiaoyu Li, Heng Wang, Xizhi Lv, Yu Peng","doi":"10.1109/APCT55107.2022.00021","DOIUrl":"https://doi.org/10.1109/APCT55107.2022.00021","url":null,"abstract":"The Internet is full of rumor posts, the spread of rumors will have a negative impact on social harmony and stability, affecting the healthy development of network information ecology. The uncertainty, timeliness, subjectivity and other characteristics of rumors make them different from general false network information. Social network rumor detection is a hot issue in the research field of social network and information transmission, which helps to further improve the efficiency and effect of rumor governance and purify the network environment. The social network rumor was defined as a social network transmission and unproven, or has been officially confirmed as false, and in the social network of information, the traditional rumors detection based on characteristics of the research focuses on text messages, publish static flat characteristics of users, the respect such as transmission, ignoring the message transmission evolution reaction of structure and transmission groups. Scholars at home and abroad have carried out many relevant studies on how to improve the efficiency of rumor detection. 138 Chinese literatures and 331 English literatures were retrieved from CNKI and Web of Science databases (retrieval date: August 2, 2021), and irrelevant literatures and news reports were removed, totaling 127 Chinese literatures and 238 English literatures. CiteSpace software was used for bibliometric analysis. By analyzing the publication time of relevant literatures, it is found that rumor detection research ushered in an outbreak period after 2019, and the number of literatures at home and abroad increased significantly. By analyzing the authors and research institutions, it is found that the maximum number of articles published by a single author at home and abroad is no more than three. The overall cooperative relationship between research institutions is not very close, and there are many independent research institutions. Through keyword analysis and existing literature review, it is found that the technologies and methods of rumor detection in recent years mainly involve “deep learning”, “attention mechanism”, “semi-supervised learning” and other technologies. The basic process of rumor detection is to combine the selected content features and social context features effectively, and then use advanced technologies such as Natural Language Processing (NLP), machine learning and deep learning to predict whether the information to be tested is false. With the deepening of the research in this field, the detection method of hybrid model is more and more popular. Rumor detection applications mainly focus on “online rumor”, “social media”, “public opinion monitoring” and other issues. The main research hotspots can be summarized as rumor detection algorithms, characteristics and propagation models, as well as research on different kinds of rumor identification and related tasks. The current research trends are the recognition of rumormonger, feature ex","PeriodicalId":237645,"journal":{"name":"2022 Asia-Pacific Computer Technologies Conference (APCT)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133936886","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Characterization of Parameter Uncertainty in SWAT Model using MCMC Bayesian Framework: The Case of Naryn River Basin","authors":"C. Chen, J. Liu, G. Huang, Y. Li","doi":"10.1109/APCT55107.2022.00010","DOIUrl":"https://doi.org/10.1109/APCT55107.2022.00010","url":null,"abstract":"Analysis of parameter uncertainty in distributed watershed model is a worldwide challenge. In this study, The Differential Evolution Adaptive Metropolis (DREAM) technique is developed to analyse the uncertainty of Soil and Water Assessment Tool (SWAT) model parameters. SWAT is used for providing the basic hydrologic simulation, DREAM algorithm is employed to approximate the posterior distributions of model parameters with Bayesian inference. DREAM is then used to capture the uncertainty and implications of parameters in the Naryn River Basin (in Central Asia). The posterior distribution of parameters is obtained. Results shows that: (i) the posterior sampling results of DREAM algorithm are satisfactory; (ii) concentrated precipitation during rainy season generates more runoff; (iii) more precipitation exists in the form of snowfall.","PeriodicalId":237645,"journal":{"name":"2022 Asia-Pacific Computer Technologies Conference (APCT)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116289364","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}