2022 IEEE 2nd International Conference on Power, Electronics and Computer Applications (ICPECA)最新文献

筛选
英文 中文
DeepAPArice: a deep learning model for poly(A) site intelligent prediction in rice using convolutional neural network DeepAPArice:一个使用卷积神经网络进行水稻多聚(a)位点智能预测的深度学习模型
Haiyong He, Guoli Ji
{"title":"DeepAPArice: a deep learning model for poly(A) site intelligent prediction in rice using convolutional neural network","authors":"Haiyong He, Guoli Ji","doi":"10.1109/ICPECA53709.2022.9718901","DOIUrl":"https://doi.org/10.1109/ICPECA53709.2022.9718901","url":null,"abstract":"Polyadenylation [poly(A)] is an extremely important step in the post-transcriptional process of premRNA, which plays a key role in gene regulation, protein binding and translation efficiency. Accurate identification of poly(A) sites can help understand gene expression regulation and improve the accuracy of gene annotation. Although there have been many machine learning methods used for poly(A) site prediction, most of them only take into account a limited set of features. With the increase of the amount of genomic data and the development of computing technology, deep learning technology has been used for solving many machine learning tasks. Here, we propose DeepAPArice, a deep learning model that predicts poly(A) sites in Oryza Sativa based on sequence features and RNA secondary structures around poly(A) sites. We compared DeepAPArice with both traditional machine learning algorithms and advanced deep learning algorithms, and the results show that DeepAPArice is superior to them in terms of several indicators.","PeriodicalId":244448,"journal":{"name":"2022 IEEE 2nd International Conference on Power, Electronics and Computer Applications (ICPECA)","volume":"89 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121947136","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A user-space virtual device driver framework for Kubernetes Kubernetes的用户空间虚拟设备驱动程序框架
Jinyong Yin, Boming Liu, Hongzhi Liu
{"title":"A user-space virtual device driver framework for Kubernetes","authors":"Jinyong Yin, Boming Liu, Hongzhi Liu","doi":"10.1109/ICPECA53709.2022.9718896","DOIUrl":"https://doi.org/10.1109/ICPECA53709.2022.9718896","url":null,"abstract":"Virtualization and Kubernetes have been widely used now in cloud platform. SRIOV-enabled devices can simulate multiple virtual devices from the hardware layer, each of which can be bound to a Pod from Kubernetes. So multiple Pods can share hardware resources, and resource utilization can be increased greatly. However, the existing drivers of virtual devices are mainly implemented in the Linux kernel space. If the driver fails, it will affect all applications on the host. In this paper, a user-space virtual device driver framework for Kubernetes is proposed. In the framework, only the driver and virtualization of physical device are implemented in kernel space. The IO address of virtual device is mapped into user space through VFIO and the driver of the virtual device is implemented in the Pause container. Other application containers in the same Pod can communicate with drivers in the Pause container through the API interface. Based on the framework, the user only needs to write drivers of virtual devices in the user space, which reduces the difficulty of developing the drivers and improves the reliability of the system. At the same time, because drivers of virtual device run in Pause containers, they can be distributed with applications together, which increases driver’s capability of isolation and distribution.","PeriodicalId":244448,"journal":{"name":"2022 IEEE 2nd International Conference on Power, Electronics and Computer Applications (ICPECA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125790769","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Deep neural network method to study computer game 用深度神经网络方法研究电脑游戏
Zhaoyong Deng, Weike Chen
{"title":"Deep neural network method to study computer game","authors":"Zhaoyong Deng, Weike Chen","doi":"10.1109/ICPECA53709.2022.9719197","DOIUrl":"https://doi.org/10.1109/ICPECA53709.2022.9719197","url":null,"abstract":"Computer game is the main research direction in the field of artificial intelligence, the research object of this computer gameselection for card games of incomplete information game dou landlord, aiming at the problem of traditional modeling methods need to manually extract the features of, through the analysis of the principle of rival modeling algorithm and characteristics, this paper proposes a neural network and decision tree based on depth assessment modeling method of rivals, The tedious manual feature extraction process is avoided. The experimental results show that the overall winning chip is higher than that of the agents using static evaluation method, which improves the level of the system game to a certain extent.","PeriodicalId":244448,"journal":{"name":"2022 IEEE 2nd International Conference on Power, Electronics and Computer Applications (ICPECA)","volume":"125 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126152702","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Digital Extraction Method of Gaussian Pulse Signal Timing Point 高斯脉冲信号时序点的数字提取方法
Liu Yong, Xu Jianwu, Wen Tianzhu, Zhang Xicai
{"title":"A Digital Extraction Method of Gaussian Pulse Signal Timing Point","authors":"Liu Yong, Xu Jianwu, Wen Tianzhu, Zhang Xicai","doi":"10.1109/ICPECA53709.2022.9719030","DOIUrl":"https://doi.org/10.1109/ICPECA53709.2022.9719030","url":null,"abstract":"In this paper, a Gaussian interpolation timing point extraction algorithm based on FPGA is implemented. According to the problem that the timing point error is less than 6ns cannot be satisfied when the effective digit is less than 7 bits, an improved algorithm for accurately extracting Gaussian pulse timing point based on FPGA is designed. Analyzed the source of timing error, the comparison of maximum error between the direct extraction algorithm, Gaussian interpolation algorithm and the improved Gaussian interpolation algorithm is presented when the sampling number is 7 and the peak is full scale. It is concluded that the improved Gaussian interpolation timing algorithm can effectively improve the timing accuracy.","PeriodicalId":244448,"journal":{"name":"2022 IEEE 2nd International Conference on Power, Electronics and Computer Applications (ICPECA)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124834408","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Data Mining Technology and Its Application in Multi-sensor Data Processing 数据挖掘技术及其在多传感器数据处理中的应用
Junjun Xu, Yunhui Guo, Jiang Wang
{"title":"Data Mining Technology and Its Application in Multi-sensor Data Processing","authors":"Junjun Xu, Yunhui Guo, Jiang Wang","doi":"10.1109/ICPECA53709.2022.9718948","DOIUrl":"https://doi.org/10.1109/ICPECA53709.2022.9718948","url":null,"abstract":"Big data contains huge data value, can effectively promote the development of university information; However, there are many difficulties in the application of big data in multi-sensor data processing. In view of the practical problems faced by the current multi-sensor data processing and big data applications, the overall architecture design and the construction of core modules of multi-sensor data processing are carried out, including data acquisition, data governance, data storage, real-time computing and big data algorithm, data management, application service center and data security center. The application of multi-sensor data processing in data mining shows that it can meet the requirements of multi-sensor data processing and provide useful reference for multi-sensor data processing.","PeriodicalId":244448,"journal":{"name":"2022 IEEE 2nd International Conference on Power, Electronics and Computer Applications (ICPECA)","volume":"2013 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128167702","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Anonymous Authentication and Application Stealth Scheme for Mobile Network Based on SPA 基于SPA的移动网络匿名认证与应用隐身方案
Rui Wang, Haiwei Li, Yanru Chen, Zheng Xue, Yan Hao, Yanfei Li
{"title":"Anonymous Authentication and Application Stealth Scheme for Mobile Network Based on SPA","authors":"Rui Wang, Haiwei Li, Yanru Chen, Zheng Xue, Yan Hao, Yanfei Li","doi":"10.1109/ICPECA53709.2022.9718888","DOIUrl":"https://doi.org/10.1109/ICPECA53709.2022.9718888","url":null,"abstract":"According to the idea of zero trust, this paper proposed an anonymous identity authentication scheme based on hash functions and pseudo-random number generators, which effectively increased the anonymity and confidentiality when users use the mobile networks, and ensure the security of the server. This scheme first used single-packet authentication technology to realize the application stealth. Secondly, hash functions and pseudo-random number generators were used to replace public key cryptosystems and time synchronization systems, which improved system performance. Thirdly, different methods were set to save encrypted information on the user's mobile device and the server, which realized different forms of anonymous authentication and negotiates a secure session key. Through security analysis, function and performance comparison, the results showed that the scheme had better security, flexibility and practicality, while maintained good communication efficiency.","PeriodicalId":244448,"journal":{"name":"2022 IEEE 2nd International Conference on Power, Electronics and Computer Applications (ICPECA)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128257791","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimization planning strategy of distribution grid based on different integrated energy use scenarios 基于不同综合能源使用场景的配电网优化规划策略
Zhao Yinan, Li Shunxin, Dong Shaoqiao, Nie Wenhai, Yang Min
{"title":"Optimization planning strategy of distribution grid based on different integrated energy use scenarios","authors":"Zhao Yinan, Li Shunxin, Dong Shaoqiao, Nie Wenhai, Yang Min","doi":"10.1109/ICPECA53709.2022.9719103","DOIUrl":"https://doi.org/10.1109/ICPECA53709.2022.9719103","url":null,"abstract":"With the continuous acceleration of urbanization and the increasing demand for electric power by social development, the construction scale of Chinese power distribution grid is also getting bigger and bigger. The planning and construction of power distribution grid is an important guarantee for the national economic and social development.Based on the analysis of different comprehensive energy use scenarios, this paper explores the feasible strategy of distribution grid optimization construction, hoping to provide some reference for relevant work.","PeriodicalId":244448,"journal":{"name":"2022 IEEE 2nd International Conference on Power, Electronics and Computer Applications (ICPECA)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127050360","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Text Analysis Method of Risk-taking Attitude and the Computer Assisted Intelligent Evaluation Model 冒险态度文本分析方法及计算机辅助智能评估模型
Yuxuan Guo, Mengtian Shi, Deqiang Deng
{"title":"A Text Analysis Method of Risk-taking Attitude and the Computer Assisted Intelligent Evaluation Model","authors":"Yuxuan Guo, Mengtian Shi, Deqiang Deng","doi":"10.1109/ICPECA53709.2022.9719033","DOIUrl":"https://doi.org/10.1109/ICPECA53709.2022.9719033","url":null,"abstract":"We distinguish the difference between the ability and attitude of corporate risk-taking, and innovatively put forward a method to measure the corporate risk-taking attitude based on the tone of the textual risk disclosure. We apply this method to the analyse annual report samples of Listed Companies in 2018. It shows that companies with a positive attitude are far more than those that are not. The non-state-owned companies have more positive risk-taking attitude than the state-owned companies, and the high-tech companies have more positive risk-taking attitude than the ordinary companies. These findings are consistent with our forecast. Our measurement method of risk-taking attitude has a good effect.","PeriodicalId":244448,"journal":{"name":"2022 IEEE 2nd International Conference on Power, Electronics and Computer Applications (ICPECA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130036745","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design and implementation of efficient hash functions 高效哈希函数的设计与实现
Han Zhuoyu, Liao Yongzhen
{"title":"Design and implementation of efficient hash functions","authors":"Han Zhuoyu, Liao Yongzhen","doi":"10.1109/ICPECA53709.2022.9719176","DOIUrl":"https://doi.org/10.1109/ICPECA53709.2022.9719176","url":null,"abstract":"With the rapid popularity of the network, the development of information encryption technology has a significant role and significance in securing network security. The security of information has become an issue of concern to the whole society, and the study of cryptography has been increasingly concerned, and the hash function is the core of modern cryptography, the most common hash algorithms are MD5 series of algorithms, SHA series of algorithms. MD5 is a popular and excellent typical Hash encryption technology today, which is used for password management, electronic signature, spam screening. In this paper, we focus on the improved MD5 algorithm with more efficiency, focusing on the internal structure of MD5, and finally making it more efficient in retrieval.","PeriodicalId":244448,"journal":{"name":"2022 IEEE 2nd International Conference on Power, Electronics and Computer Applications (ICPECA)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129088226","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Algorithm Research on Fuzzy Test Method of CAN Bus Based on Field Weight 基于场权的CAN总线模糊测试方法算法研究
Yunhui Jia, Jianhong Yang, S. Wang, Yi Wang, Hongshuo Chen, Zonghao Ma
{"title":"Algorithm Research on Fuzzy Test Method of CAN Bus Based on Field Weight","authors":"Yunhui Jia, Jianhong Yang, S. Wang, Yi Wang, Hongshuo Chen, Zonghao Ma","doi":"10.1109/ICPECA53709.2022.9719092","DOIUrl":"https://doi.org/10.1109/ICPECA53709.2022.9719092","url":null,"abstract":"The communication network in the vehicle, especially the CAN bus network, is under serious security threat. The security of CAN bus network can be improved by fuzzy test technology. At present, there is little research on the fuzzy test technology of automobile can bus. The test case generation method mostly adopts the random generation method, without considering the application layer protocol format of CAN bus, which reduces the passing rate of CAN bus message, It affects the efficiency of fuzzy testing. This paper compares the advantages and disadvantages of the fuzzy testing algorithm based on the improved wgan-gp and the fuzzy testing algorithm based on the field weight. Both algorithms can find the vulnerabilities in the CAN bus and affect the vehicle to produce abnormal response. The fuzzy testing algorithm based on the improved wgan-gp has shorter discovery time and response time and better effect.","PeriodicalId":244448,"journal":{"name":"2022 IEEE 2nd International Conference on Power, Electronics and Computer Applications (ICPECA)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132954118","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信