{"title":"DeepAPArice: a deep learning model for poly(A) site intelligent prediction in rice using convolutional neural network","authors":"Haiyong He, Guoli Ji","doi":"10.1109/ICPECA53709.2022.9718901","DOIUrl":"https://doi.org/10.1109/ICPECA53709.2022.9718901","url":null,"abstract":"Polyadenylation [poly(A)] is an extremely important step in the post-transcriptional process of premRNA, which plays a key role in gene regulation, protein binding and translation efficiency. Accurate identification of poly(A) sites can help understand gene expression regulation and improve the accuracy of gene annotation. Although there have been many machine learning methods used for poly(A) site prediction, most of them only take into account a limited set of features. With the increase of the amount of genomic data and the development of computing technology, deep learning technology has been used for solving many machine learning tasks. Here, we propose DeepAPArice, a deep learning model that predicts poly(A) sites in Oryza Sativa based on sequence features and RNA secondary structures around poly(A) sites. We compared DeepAPArice with both traditional machine learning algorithms and advanced deep learning algorithms, and the results show that DeepAPArice is superior to them in terms of several indicators.","PeriodicalId":244448,"journal":{"name":"2022 IEEE 2nd International Conference on Power, Electronics and Computer Applications (ICPECA)","volume":"89 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121947136","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A user-space virtual device driver framework for Kubernetes","authors":"Jinyong Yin, Boming Liu, Hongzhi Liu","doi":"10.1109/ICPECA53709.2022.9718896","DOIUrl":"https://doi.org/10.1109/ICPECA53709.2022.9718896","url":null,"abstract":"Virtualization and Kubernetes have been widely used now in cloud platform. SRIOV-enabled devices can simulate multiple virtual devices from the hardware layer, each of which can be bound to a Pod from Kubernetes. So multiple Pods can share hardware resources, and resource utilization can be increased greatly. However, the existing drivers of virtual devices are mainly implemented in the Linux kernel space. If the driver fails, it will affect all applications on the host. In this paper, a user-space virtual device driver framework for Kubernetes is proposed. In the framework, only the driver and virtualization of physical device are implemented in kernel space. The IO address of virtual device is mapped into user space through VFIO and the driver of the virtual device is implemented in the Pause container. Other application containers in the same Pod can communicate with drivers in the Pause container through the API interface. Based on the framework, the user only needs to write drivers of virtual devices in the user space, which reduces the difficulty of developing the drivers and improves the reliability of the system. At the same time, because drivers of virtual device run in Pause containers, they can be distributed with applications together, which increases driver’s capability of isolation and distribution.","PeriodicalId":244448,"journal":{"name":"2022 IEEE 2nd International Conference on Power, Electronics and Computer Applications (ICPECA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125790769","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Deep neural network method to study computer game","authors":"Zhaoyong Deng, Weike Chen","doi":"10.1109/ICPECA53709.2022.9719197","DOIUrl":"https://doi.org/10.1109/ICPECA53709.2022.9719197","url":null,"abstract":"Computer game is the main research direction in the field of artificial intelligence, the research object of this computer gameselection for card games of incomplete information game dou landlord, aiming at the problem of traditional modeling methods need to manually extract the features of, through the analysis of the principle of rival modeling algorithm and characteristics, this paper proposes a neural network and decision tree based on depth assessment modeling method of rivals, The tedious manual feature extraction process is avoided. The experimental results show that the overall winning chip is higher than that of the agents using static evaluation method, which improves the level of the system game to a certain extent.","PeriodicalId":244448,"journal":{"name":"2022 IEEE 2nd International Conference on Power, Electronics and Computer Applications (ICPECA)","volume":"125 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126152702","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Digital Extraction Method of Gaussian Pulse Signal Timing Point","authors":"Liu Yong, Xu Jianwu, Wen Tianzhu, Zhang Xicai","doi":"10.1109/ICPECA53709.2022.9719030","DOIUrl":"https://doi.org/10.1109/ICPECA53709.2022.9719030","url":null,"abstract":"In this paper, a Gaussian interpolation timing point extraction algorithm based on FPGA is implemented. According to the problem that the timing point error is less than 6ns cannot be satisfied when the effective digit is less than 7 bits, an improved algorithm for accurately extracting Gaussian pulse timing point based on FPGA is designed. Analyzed the source of timing error, the comparison of maximum error between the direct extraction algorithm, Gaussian interpolation algorithm and the improved Gaussian interpolation algorithm is presented when the sampling number is 7 and the peak is full scale. It is concluded that the improved Gaussian interpolation timing algorithm can effectively improve the timing accuracy.","PeriodicalId":244448,"journal":{"name":"2022 IEEE 2nd International Conference on Power, Electronics and Computer Applications (ICPECA)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124834408","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Data Mining Technology and Its Application in Multi-sensor Data Processing","authors":"Junjun Xu, Yunhui Guo, Jiang Wang","doi":"10.1109/ICPECA53709.2022.9718948","DOIUrl":"https://doi.org/10.1109/ICPECA53709.2022.9718948","url":null,"abstract":"Big data contains huge data value, can effectively promote the development of university information; However, there are many difficulties in the application of big data in multi-sensor data processing. In view of the practical problems faced by the current multi-sensor data processing and big data applications, the overall architecture design and the construction of core modules of multi-sensor data processing are carried out, including data acquisition, data governance, data storage, real-time computing and big data algorithm, data management, application service center and data security center. The application of multi-sensor data processing in data mining shows that it can meet the requirements of multi-sensor data processing and provide useful reference for multi-sensor data processing.","PeriodicalId":244448,"journal":{"name":"2022 IEEE 2nd International Conference on Power, Electronics and Computer Applications (ICPECA)","volume":"2013 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128167702","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Rui Wang, Haiwei Li, Yanru Chen, Zheng Xue, Yan Hao, Yanfei Li
{"title":"Anonymous Authentication and Application Stealth Scheme for Mobile Network Based on SPA","authors":"Rui Wang, Haiwei Li, Yanru Chen, Zheng Xue, Yan Hao, Yanfei Li","doi":"10.1109/ICPECA53709.2022.9718888","DOIUrl":"https://doi.org/10.1109/ICPECA53709.2022.9718888","url":null,"abstract":"According to the idea of zero trust, this paper proposed an anonymous identity authentication scheme based on hash functions and pseudo-random number generators, which effectively increased the anonymity and confidentiality when users use the mobile networks, and ensure the security of the server. This scheme first used single-packet authentication technology to realize the application stealth. Secondly, hash functions and pseudo-random number generators were used to replace public key cryptosystems and time synchronization systems, which improved system performance. Thirdly, different methods were set to save encrypted information on the user's mobile device and the server, which realized different forms of anonymous authentication and negotiates a secure session key. Through security analysis, function and performance comparison, the results showed that the scheme had better security, flexibility and practicality, while maintained good communication efficiency.","PeriodicalId":244448,"journal":{"name":"2022 IEEE 2nd International Conference on Power, Electronics and Computer Applications (ICPECA)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128257791","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Zhao Yinan, Li Shunxin, Dong Shaoqiao, Nie Wenhai, Yang Min
{"title":"Optimization planning strategy of distribution grid based on different integrated energy use scenarios","authors":"Zhao Yinan, Li Shunxin, Dong Shaoqiao, Nie Wenhai, Yang Min","doi":"10.1109/ICPECA53709.2022.9719103","DOIUrl":"https://doi.org/10.1109/ICPECA53709.2022.9719103","url":null,"abstract":"With the continuous acceleration of urbanization and the increasing demand for electric power by social development, the construction scale of Chinese power distribution grid is also getting bigger and bigger. The planning and construction of power distribution grid is an important guarantee for the national economic and social development.Based on the analysis of different comprehensive energy use scenarios, this paper explores the feasible strategy of distribution grid optimization construction, hoping to provide some reference for relevant work.","PeriodicalId":244448,"journal":{"name":"2022 IEEE 2nd International Conference on Power, Electronics and Computer Applications (ICPECA)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127050360","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Text Analysis Method of Risk-taking Attitude and the Computer Assisted Intelligent Evaluation Model","authors":"Yuxuan Guo, Mengtian Shi, Deqiang Deng","doi":"10.1109/ICPECA53709.2022.9719033","DOIUrl":"https://doi.org/10.1109/ICPECA53709.2022.9719033","url":null,"abstract":"We distinguish the difference between the ability and attitude of corporate risk-taking, and innovatively put forward a method to measure the corporate risk-taking attitude based on the tone of the textual risk disclosure. We apply this method to the analyse annual report samples of Listed Companies in 2018. It shows that companies with a positive attitude are far more than those that are not. The non-state-owned companies have more positive risk-taking attitude than the state-owned companies, and the high-tech companies have more positive risk-taking attitude than the ordinary companies. These findings are consistent with our forecast. Our measurement method of risk-taking attitude has a good effect.","PeriodicalId":244448,"journal":{"name":"2022 IEEE 2nd International Conference on Power, Electronics and Computer Applications (ICPECA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130036745","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design and implementation of efficient hash functions","authors":"Han Zhuoyu, Liao Yongzhen","doi":"10.1109/ICPECA53709.2022.9719176","DOIUrl":"https://doi.org/10.1109/ICPECA53709.2022.9719176","url":null,"abstract":"With the rapid popularity of the network, the development of information encryption technology has a significant role and significance in securing network security. The security of information has become an issue of concern to the whole society, and the study of cryptography has been increasingly concerned, and the hash function is the core of modern cryptography, the most common hash algorithms are MD5 series of algorithms, SHA series of algorithms. MD5 is a popular and excellent typical Hash encryption technology today, which is used for password management, electronic signature, spam screening. In this paper, we focus on the improved MD5 algorithm with more efficiency, focusing on the internal structure of MD5, and finally making it more efficient in retrieval.","PeriodicalId":244448,"journal":{"name":"2022 IEEE 2nd International Conference on Power, Electronics and Computer Applications (ICPECA)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129088226","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yunhui Jia, Jianhong Yang, S. Wang, Yi Wang, Hongshuo Chen, Zonghao Ma
{"title":"Algorithm Research on Fuzzy Test Method of CAN Bus Based on Field Weight","authors":"Yunhui Jia, Jianhong Yang, S. Wang, Yi Wang, Hongshuo Chen, Zonghao Ma","doi":"10.1109/ICPECA53709.2022.9719092","DOIUrl":"https://doi.org/10.1109/ICPECA53709.2022.9719092","url":null,"abstract":"The communication network in the vehicle, especially the CAN bus network, is under serious security threat. The security of CAN bus network can be improved by fuzzy test technology. At present, there is little research on the fuzzy test technology of automobile can bus. The test case generation method mostly adopts the random generation method, without considering the application layer protocol format of CAN bus, which reduces the passing rate of CAN bus message, It affects the efficiency of fuzzy testing. This paper compares the advantages and disadvantages of the fuzzy testing algorithm based on the improved wgan-gp and the fuzzy testing algorithm based on the field weight. Both algorithms can find the vulnerabilities in the CAN bus and affect the vehicle to produce abnormal response. The fuzzy testing algorithm based on the improved wgan-gp has shorter discovery time and response time and better effect.","PeriodicalId":244448,"journal":{"name":"2022 IEEE 2nd International Conference on Power, Electronics and Computer Applications (ICPECA)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132954118","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}