2021 3rd International Conference on Advances in Computer Technology, Information Science and Communication (CTISC)最新文献

筛选
英文 中文
Developing Energy Monitoring Application For Monitoring Power Consumption In Production Machines 开发能源监测应用,监测生产机械的功耗
Masmur Tarigan, A. pambudi, H. Sutopo, H. Hendra, Dini Handayani
{"title":"Developing Energy Monitoring Application For Monitoring Power Consumption In Production Machines","authors":"Masmur Tarigan, A. pambudi, H. Sutopo, H. Hendra, Dini Handayani","doi":"10.1109/CTISC52352.2021.00015","DOIUrl":"https://doi.org/10.1109/CTISC52352.2021.00015","url":null,"abstract":"The manufacturing sector in Indonesia is included in the category of countries with large-scale industries. Every day, of course, activities in the industrial sector need a production process and require electric power as a support for ongoing productivity. The power consumption used in the production process needs monitoring and control as needed. Monitoring the power consumption of machines in the PT. Modern Gravure Indonesia has not been well monitored. To make efforts in calculating the amount of electrical power used, a system that can monitor the amount of power consumption on production machines in real-time is needed for carrying out better electricity management. Then an Internet of Things-based system is made which is integrated into the Android-based Energy Monitoring application for monitoring power consumption and cost calculations, this monitoring system for monitoring power consumption uses the STC013 Current sensor as a flow detector and uses the Arduino Pro Mini as a microcontroller in developing a power consumption monitoring system. This research uses System Development Life Cycle that consists of planning, analysis, design, implementation, testing and integration, and maintenance. stakeholders. This Energy Monitoring application is expected to help get real-time power consumption data.","PeriodicalId":268378,"journal":{"name":"2021 3rd International Conference on Advances in Computer Technology, Information Science and Communication (CTISC)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125173479","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The construction of wireless channel model visualization platform based on Cesium 基于铯的无线信道模型可视化平台的构建
Junming Li, Tianfeng Yan
{"title":"The construction of wireless channel model visualization platform based on Cesium","authors":"Junming Li, Tianfeng Yan","doi":"10.1109/CTISC52352.2021.00048","DOIUrl":"https://doi.org/10.1109/CTISC52352.2021.00048","url":null,"abstract":"Aiming at the requirement of wireless channel model visualization, this paper builds a wireless channel visualization platform based on Cesium framework. Based on the UAV oblique photogrammetry technology, the paper constructs the model of complex area from the aspects of UAV aerial survey data acquisition, data processing and 3D model restoration, introduces and renders the wireless channel model ——Ten-Ray model, and realizes the browsing and interaction of the experimental scene by using unity3d engine. The platform can basically meet the needs of wireless channel visualization.","PeriodicalId":268378,"journal":{"name":"2021 3rd International Conference on Advances in Computer Technology, Information Science and Communication (CTISC)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116235338","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Robust feature point detection for freehand strokes with deep learning approach 基于深度学习方法的写意笔画鲁棒特征点检测
Long Zeng, X. Zhang, Zhi-Kai Dong, Hong-yu Wang, Jia-yi Yu
{"title":"Robust feature point detection for freehand strokes with deep learning approach","authors":"Long Zeng, X. Zhang, Zhi-Kai Dong, Hong-yu Wang, Jia-yi Yu","doi":"10.1109/CTISC52352.2021.00078","DOIUrl":"https://doi.org/10.1109/CTISC52352.2021.00078","url":null,"abstract":"A robust feature point detection (FPD) tool is critical for sketch-based engineering modelling. We propose an FPD algorithm for freehand strokes based on a deep learning approach, denoted as FPD-DL. First, a point-wise neural network is trained to learn local and global features from points' multi-scale context images to classify each point of a stroke into a line-point or a curve-point. Then, a segment merging procedure is designed to extract primitives from the identified segments. It explores the distribution patterns of neighbouring segments. Finally, the tangent points and lost corners are added among consecutive primitives. The algorithm robustness and accuracy are experimented on a dataset with 1500 strokes of 20 shapes, which are grouped into two categories: set-by-person and set-by-shape. In the set-by-person category, the AON (all-or-nothing) accuracy of FPD-DL is 97%, compared to 94.3% of the state-of-the-art algorithm. In the set-by-shape category, the robustness to stroke shape is tested, which is similar to the practical usage scenario. The AON accuracy of FPD-DL is 95%, without too much fluctuation. Thus, the new proposed approach is robust to both stroke shape and stroke style.","PeriodicalId":268378,"journal":{"name":"2021 3rd International Conference on Advances in Computer Technology, Information Science and Communication (CTISC)","volume":"253 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115007841","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Improved SSD Algorithm Based on Multi-scale Feature Fusion and Residual Attention Mechanism 基于多尺度特征融合和剩余注意机制的改进SSD算法
Yongquan Zhao
{"title":"Improved SSD Algorithm Based on Multi-scale Feature Fusion and Residual Attention Mechanism","authors":"Yongquan Zhao","doi":"10.1109/CTISC52352.2021.00024","DOIUrl":"https://doi.org/10.1109/CTISC52352.2021.00024","url":null,"abstract":"Convolutional neural network (CNN) has led to significant progress in object detection. In order to detect the objects in various sizes, the object detectors often exploit the hierarchy of the multi-scale feature maps called feature pyramid, which is readily obtained by the CNN architecture. However, such feature maps do not fully consider the supplementary effect of contextual information on semantics. In this work, we proposed a feature fusion method of residual attention based on the SSD benchmark network call Improved SSD to make full use of context information to improve the characterization ability of feature maps. Besides, we use the residual attention mechanism to reinforce the key features to further improve the detector performance. The experiment result on benchmark dataset PASCAL VOC shows that the map of the proposed method with input image sizes of 300×300 and 512×512 is 78.8% and 80.7%.","PeriodicalId":268378,"journal":{"name":"2021 3rd International Conference on Advances in Computer Technology, Information Science and Communication (CTISC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133759876","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Novel Incentive Mechanism Based on Repeated Game in Fog Computing 一种基于重复博弈的雾计算激励机制
Jun Li, Wei Zhang, Xuehong Chen, Shuaifeng Yang, Xueying Zhang, Hao Zhou, Yunpeng Li
{"title":"A Novel Incentive Mechanism Based on Repeated Game in Fog Computing","authors":"Jun Li, Wei Zhang, Xuehong Chen, Shuaifeng Yang, Xueying Zhang, Hao Zhou, Yunpeng Li","doi":"10.1109/CTISC52352.2021.00029","DOIUrl":"https://doi.org/10.1109/CTISC52352.2021.00029","url":null,"abstract":"Fog computing is a new computing paradigm that utilizes numerous mutually cooperating terminal devices or network edge devices to provide computing, storage, and communication services. Fog computing extends cloud computing services to the edge of the network, making up for the deficiencies of cloud computing in terms of location awareness, mobility support and latency. However, fog nodes are not active enough to perform tasks, and fog nodes recruited by cloud service providers cannot provide stable and continuous resources, which limits the development of fog computing. In the process of cloud service providers using the resources in the fog nodes to provide services to users, the cloud service providers and fog nodes are selfish and committed to maximizing their own payoffs. This situation makes it easy for the fog node to work negatively during the execution of the task. Limited by the low quality of resource provided by fog nodes, the payoff of cloud service providers has been severely affected. In response to this problem, an appropriate incentive mechanism needs to be established in the fog computing environment to solve the core problems faced by both cloud service providers and fog nodes in maximizing their respective utility, in order to achieve the incentive effect. Therefore, this paper proposes an incentive model based on repeated game, and designs a trigger strategy with credible threats, and obtains the conditions for incentive consistency. Under this condition, the fog node will be forced by the deterrence of the trigger strategy to voluntarily choose the strategy of actively executing the task, so as to avoid the loss of subsequent rewards when it is found to perform the task passively. Then, using evolutionary game theory to analyze the stability of the trigger strategy, it proves the dynamic validity of the incentive consistency condition.","PeriodicalId":268378,"journal":{"name":"2021 3rd International Conference on Advances in Computer Technology, Information Science and Communication (CTISC)","volume":"103 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134497380","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Resnet-based quality evaluation of image mosaic and training data balance 基于resnet的图像拼接质量评价与训练数据平衡
Xianglei Meng, Liang Han, C. Zuo, Pin Tao
{"title":"Resnet-based quality evaluation of image mosaic and training data balance","authors":"Xianglei Meng, Liang Han, C. Zuo, Pin Tao","doi":"10.1109/CTISC52352.2021.00067","DOIUrl":"https://doi.org/10.1109/CTISC52352.2021.00067","url":null,"abstract":"Many image Mosaic algorithms have been pro-posed in recent decades, we also need the algorithm to evaluate the quality of image stitching. This paper verifies the possibility of image mosaic quality evaluation based on neural network. Experiment results show it is effective and has the strong scalability on different data sets. Furthermore, the influence of training data balance and the network deep of ResNet are analyzed. Ten times amount data will reduce the mean error from 2 to 1. Balance data set can reduce the mean error significantly. The deeper ResNet34 is better than ResNet18 which can train faster but needs more memory space.","PeriodicalId":268378,"journal":{"name":"2021 3rd International Conference on Advances in Computer Technology, Information Science and Communication (CTISC)","volume":"408 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115933092","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Pre-Training Convolution Network for Crowd Counting 人群计数的预训练卷积网络
Shining, Shaojiayu
{"title":"Pre-Training Convolution Network for Crowd Counting","authors":"Shining, Shaojiayu","doi":"10.1109/CTISC52352.2021.00062","DOIUrl":"https://doi.org/10.1109/CTISC52352.2021.00062","url":null,"abstract":"Image crowd density estimation is widely used in video surveillance, traffic surveillance and public safety. Recently, the convolutional neural network based approach has shown better results in crowd counting than the traditional approach. However, there are still a lot of limitations and difficulties in practical application :large-range number of people, changeable environment result in the current methods fail work well. In addition, Due to the lack of practical data, many methods suffer from over-fitting in varying degrees. To solve these two problems, first, we built a data collector and annotator, which can generate a large number of synthetic crowd scenes without any labor cost, and annotate them automatically. Secondly, we use pre-training method to pre-train on the synthetic dataset, and then fine-tune with the real data to effectively improve the performance of the model in the real scene. Extensive experiments show that the method is achieves the state-of-the-art performance on four real datasets.","PeriodicalId":268378,"journal":{"name":"2021 3rd International Conference on Advances in Computer Technology, Information Science and Communication (CTISC)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131998617","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multi-factor Load Balancing Algorithm for 5G Power Network Data Center 5G电网数据中心多因素负载均衡算法
Sun Yanzhi, L. Yuming, Wen Quan, Fu Cheng, Jiang Liqiong
{"title":"Multi-factor Load Balancing Algorithm for 5G Power Network Data Center","authors":"Sun Yanzhi, L. Yuming, Wen Quan, Fu Cheng, Jiang Liqiong","doi":"10.1109/CTISC52352.2021.00042","DOIUrl":"https://doi.org/10.1109/CTISC52352.2021.00042","url":null,"abstract":"In 5g era, data center is the core facility of load data exchange, and its internal network traffic shows explosive growth. Aiming at the coexistence of bandwidth sensitive traffic and delay sensitive traffic in power data center network, this paper proposes MFLB (multiple factor load balancing) algorithm. Considering the multi-dimensional statistical characteristics of links, the algorithm integrates six parameters and four dimensions of hops, path delay, average link delay, maximum link delay, maximum residual bandwidth and minimum residual bandwidth to filter paths. The simulation environment is built based on mininet. By comparing with the existing algorithms, the performance of MFLB algorithm in average throughput, standardized total throughput and link delay is significantly improved.","PeriodicalId":268378,"journal":{"name":"2021 3rd International Conference on Advances in Computer Technology, Information Science and Communication (CTISC)","volume":"254 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132189038","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
System Throughput Performances Analyses with Stochastic Geometry in Unlicensed Spectrum Systems 基于随机几何的无许可频谱系统吞吐量性能分析
Zhiyuan Liu, Xiaodong Xu
{"title":"System Throughput Performances Analyses with Stochastic Geometry in Unlicensed Spectrum Systems","authors":"Zhiyuan Liu, Xiaodong Xu","doi":"10.1109/CTISC52352.2021.00016","DOIUrl":"https://doi.org/10.1109/CTISC52352.2021.00016","url":null,"abstract":"With the increasing shortage of spectrum resources, the use of unlicensed spectrum is garnering more attention. This paper establishes a theoretical framework based on stochastic geometry to analyze the throughput performances of a cellular network with unlicensed spectrum. Considering that both cellular and WiFi users adopt a listen-before-talk (LBT) spectrum sharing scheme, we model it as a hard core point process (HCPP). Our analysis focuses on the combined effect of cellular user and WiFi user density on the throughput performances, and obtains their integral solution. The results show that the use of unlicensed spectrum can increase the throughput of cellular users when the densities of the two types of users are considered, which are of practical value to holistic designs and deployments of License Assisted Access (LAA) systems.","PeriodicalId":268378,"journal":{"name":"2021 3rd International Conference on Advances in Computer Technology, Information Science and Communication (CTISC)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125441627","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Four Search Method Obtaining the Conjugating Direction Along the Negative Gradient Directions 沿负梯度方向求共轭方向的四种搜索方法
D. Hu, Xiaoli Yin, Chunming Li
{"title":"Four Search Method Obtaining the Conjugating Direction Along the Negative Gradient Directions","authors":"D. Hu, Xiaoli Yin, Chunming Li","doi":"10.1109/CTISC52352.2021.00033","DOIUrl":"https://doi.org/10.1109/CTISC52352.2021.00033","url":null,"abstract":"To find a better conjugate direction, the optimization effect of six search (six-seeking) and three search method are analyzed. Because of the arbitrariness of the initial point, the first process of optimizing along the negative gradient direction is abandoned. The four search method is put forward. Each best or optimal point is the initial point of the next optimization. After three time of consecutive searches along the negative gradient directions, take the conjugate direction obtained from the second and the third optimization as the fourth search direction. That is, there are four search directions in each loop. The steps, valid mathematical proof, and program flow chart are given. A quadratic function with three variables and Rosenbrock function with two variables are used as the objective functions to verify the methods. Two examples prove the validity of the 4 search method to complex objective function. Therefore, the four search method is a better conjugate direction method.","PeriodicalId":268378,"journal":{"name":"2021 3rd International Conference on Advances in Computer Technology, Information Science and Communication (CTISC)","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127040085","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信