{"title":"Encryption method of electronic conference image based on mixed chaotic sequences","authors":"Du Wang, Yongqiang Guo","doi":"10.1117/12.2674709","DOIUrl":"https://doi.org/10.1117/12.2674709","url":null,"abstract":"Because the image has the characteristics of large amount of information and high redundancy, the traditional AES, DES and other encryption methods applied to text and numbers can not be effective. Chaotic sequence algorithm has natural similarity with cryptography, such as extreme sensitivity to initial value, ergodicity, non-periodicity, pseudo-randomness and very high iterative rate. as a result, the encryption of chaotic sequence algorithm in the field of electronic conference image will be better than the traditional encryption method, and it has become a new direction to solve the problem of electronic conference image encryption. However, the limited computer accuracy will also reduce the randomness of chaotic sequences. in order to make up for this defect, this paper uses the idea of hybrid encryption to design a more secure and efficient hybrid chaotic sequence encryption algorithm.","PeriodicalId":286364,"journal":{"name":"Conference on Computer Graphics, Artificial Intelligence, and Data Processing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132759905","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"High-risk areas identification of transmission lines based on historical warning information","authors":"Fei Wang, Lingqi Kong","doi":"10.1117/12.2674562","DOIUrl":"https://doi.org/10.1117/12.2674562","url":null,"abstract":"With the upgrade of transmission line maintenance technology, the visual remote inspection of transmission line channel is widely used. However, the application of these marked data is currently in the stage of statistical analysis and report form, a deeper data mining work has not been carried out, such as the identification of areas with high incidence of alarm. This paper presents a method of analysis of high risk area of transmission line channel based on historical early warning data, which can be applied to the field of transmission line maintenance. By preprocessing the transmission line visual alarm data, using the improved k-means algorithm, analyze the clustering results, and finding out the series of modeling and data analysis. In addition, when determining the initial points, we propose the maximum and minimum longitude and latitude coordinates of the alarm dataset, divide a certain number of longitude and latitude grid, obtain the candidate data within each grid, and the method of obtaining the initial point set after screening. Based on the initial point set, the alarm area distribution is reasonable, and the regional stability does not drift. This paper can identify the visual alarm data of transmission lines with high alarm incidence areas, and provide effective data support for maintenance personnel to guide the deployment of human resources and ensure the safe operation of transmission lines.","PeriodicalId":286364,"journal":{"name":"Conference on Computer Graphics, Artificial Intelligence, and Data Processing","volume":"94 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115015426","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An integrated design method of robot intelligent joints based on artificial intelligence","authors":"Lina Guo","doi":"10.1117/12.2674672","DOIUrl":"https://doi.org/10.1117/12.2674672","url":null,"abstract":"Now, industrial robots are gradually popularized in the industrial scene, gradually replacing some tasks that were originally participated in. In order to solve the disadvantages of traditional robots, a series of new concepts such as flexibility, lightweight, integrated joints, and cooperative robots have emerged gradually, and finally the cooperative robot with integrated joints has become a mainstream direction today. In view of the rise of cooperative robots and the demand for integrated joints, this paper studies the integrated design(ID) method of robot intelligent joints based on artificial intelligence(AI). The development and modeling of modular joint and the hardware design of integrated joint robot are discussed; The modular joint was tested from different aspects, and the torque and positioning accuracy of the joint were tested to verify the functionality and applicability of the modular joint.","PeriodicalId":286364,"journal":{"name":"Conference on Computer Graphics, Artificial Intelligence, and Data Processing","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124509208","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Semantic segmentation algorithm of underwater image based on improved DeepLab v3+","authors":"Yongqi Yuan, Yubo Tian","doi":"10.1117/12.2674688","DOIUrl":"https://doi.org/10.1117/12.2674688","url":null,"abstract":"Underwater images are easily affected by external factors such as light and water impurities, resulting in low segmentation accuracy of underwater images. Aiming to solve the problem, this paper proposes a semantic segmentation method of underwater images by introducing a new branch to improve the structure of the DeepLab v3+ model. It exploits the low-semantic features of the input image to improve the performance of the network. In the new branch, down-sampling is used to adjust the resolution of the input image, and the dimension of the feature map is adjusted by 1×1 convolution. The attention mechanism is used to focus on the channel of the feature map, and finally, the feature map of the existing branch is merged. In the experiments on the SUIM underwater dataset, the average intersection ratio of the model is 72.88%, and the average pixel accuracy is 84.03%. In the experiments on the PASCAL VOC dataset, the average intersection ratio of the model is 75.85%, and the average pixel accuracy is 84.5%. Compared with existing mainstream algorithms, the proposed algorithm achieves better results.","PeriodicalId":286364,"journal":{"name":"Conference on Computer Graphics, Artificial Intelligence, and Data Processing","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124608042","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Cheng Pan, Aimin Gong, Fang-Zhi Wei, Xuan Zhang, Yitian Song
{"title":"Artificial intelligence-based traditional Chinese medicine assistive diagnostic system: analysis of pulse parameters in patients with systemic lupus erythematosus and the factors influencing their Chinese medical evidence patterns","authors":"Cheng Pan, Aimin Gong, Fang-Zhi Wei, Xuan Zhang, Yitian Song","doi":"10.1117/12.2674642","DOIUrl":"https://doi.org/10.1117/12.2674642","url":null,"abstract":"Objective: to analyze the characteristics of pulse pattern parameters of systemic lupus erythematosus (SLE) patients and the factors influencing their TCM patterns, and to provide an objective basis for their TCM pulse diagnosis and diagnosis. Methods: the SmartTCM-A1 TCM intelligent detection system was used to collect pulse diagnosis image information from 267 SLE patients (140 in the Yin deficiency internal heat evidence group, 96 in the heat toxin incandescence evidence group, and 31 in the rheumatic heat paralysis evidence group) and 130 healthy individuals, extract the image parameters of pulse diagnosis, and analyze the characteristics of pulse diagnosis parameters of SLE patients and their influencing factors of pulse diagnosis parameters of different TCM evidence types by logistic regression model. Results: ① compared with the healthy group, the pulse parameters h1 value, h4 value, and t1/t value were significantly higher in the SLE group (P<0.05) and the pulse parameter t value was significantly lower in the SLE group (P<0.05); logistic regression analysis showed that the independent influencing factors in SLE patients included: h4 value (OR=1.073; 95% CI=1.003-1.148 ;P<0.05), t-value (OR=0.003;95% CI=0.000-0.763;P<0.05) and t1/t-value (OR=0.000;95% CI=0.000- 1.199;P<0.05). ② Compared with the group with incandescent heat toxin evidence, the h4 value, h5 value, t4 value, t5 value, t5/t4 value were significantly lower in the group with Yin deficiency internal heat evidence (P<0.05), the h4/h1 value and t1/t4 value were significantly higher in the group with Yin deficiency internal heat evidence (P<0.05), the h4 value, h5 value, t5 value, h4/h1 value were significantly lower in the group with rheumatic heat paralysis evidence (P<0.05), and the t4 value, h5/h1 value, t5/t1 value were significantly lower in the group with rheumatic heat paralysis evidence (P<0.05). , h5/h1 values, and t1/t4 values were significantly higher in the rheumatism-heat paralysis group (P<0.05); logistic regression analysis. The results showed that the independent influencing factors of TCM evidence in SLE patients included: h3 values in the yin deficiency internal heat evidence group (OR=2.295; 95% CI=1.843-2.858; P<0.05) and h3 values in the rheumatic heat paralysis evidence group (OR=2.309; 95% CI=1.87-2.85; P<0.05). Conclusion: conclusion pulse diagnosis parameters h4 value, t value and t1/t value are one of the influencing factors for the diagnosis of SLE patients, and pulse diagnosis parameter h3 value is one of the influencing factors for the diagnosis of SLE Chinese medical evidence.","PeriodicalId":286364,"journal":{"name":"Conference on Computer Graphics, Artificial Intelligence, and Data Processing","volume":"12604 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129389115","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The improved clustering algorithm is used to analyze the data anomalies in the network environment","authors":"Xiaojia Lin","doi":"10.1117/12.2674851","DOIUrl":"https://doi.org/10.1117/12.2674851","url":null,"abstract":"In this paper, an improved clustering algorithm is proposed and a heterogeneous model based on this model is developed. A new data extraction technology, such as data classification, network platform anomaly detection, distributed maximum frequent sequence extraction, comparison and mining of maximum frequent sequence data, is adopted. Through the comparison experiment, it is found that the algorithm can better reflect the correlation with the corresponding abnormal data types, and can better reflect the actual use of the algorithm.","PeriodicalId":286364,"journal":{"name":"Conference on Computer Graphics, Artificial Intelligence, and Data Processing","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127169519","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A comparative study of deep learning methods for drilling performance prediction","authors":"Tong Jiao, Ye Liu, Jie Cao, D. Sui","doi":"10.1117/12.2674979","DOIUrl":"https://doi.org/10.1117/12.2674979","url":null,"abstract":"Rate of penetration is a key parameter to describe the efficiency of drilling through the formations and it has always been a measure of drilling efficiency. Previous research has demonstrated that machine learning can be applied to improve the prediction of ROP from conventional correlation approaches. More recently, deep learning models have also been used toward that purpose. In this research, the typical used machine learning methods and deep learning methods are tested and compared in terms of ROP prediction. An open-source drilling dataset is used for single well and multiple well modeling and testing. The results demonstrate that deep learning models have more general and accurate results, and LSTM shows solid prediction performance for both single well and multiple well cases. The accurate prediction model for ROP can be further applied for the planning phase and real-time operation optimization.","PeriodicalId":286364,"journal":{"name":"Conference on Computer Graphics, Artificial Intelligence, and Data Processing","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127371972","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on laboratory intelligent security management mode based on big data and cloud services","authors":"Chang-Hun Ji","doi":"10.1117/12.2674938","DOIUrl":"https://doi.org/10.1117/12.2674938","url":null,"abstract":"With the popularization of information technology, the proportion of universities in the field of scientific research investment has increased year by year, which is also mainly used for laboratory investment. With the continuous maturity of cloud service technology, intelligent laboratory management has become the main mode of university management, which will gradually replace the traditional manual management. Through various sensing devices, the intelligent laboratory can realize the intelligent management of equipment, personnel, safety and technical data, which is the main embodiment of intelligence. Research method: through the intelligent laboratory management and control platform, managers can directly intelligentized the management system and control the laboratory, which is the necessity of the laboratory intelligent security management mode. Through the intelligent system, managers can realize the standardization, process and informatization of technical data, which will improve the utilization and sharing rate of experimental equipment. This paper mainly refers to the literature survey and empirical research. Through the investigation of literature to obtain information, this paper comprehensively and correctly understand a method to master the problem to be studied. The literature research method is widely used in various disciplines. Through empirical research, this paper proposes a design mode using scientific instruments and equipment, which can be used to observe, record and measure the intelligent management mode of laboratories step by step. Conclusion: the development of laboratory intelligent security management mode based on big data and cloud services has become the development trend of university laboratory management, which is of great significance to improve the scientific research level of universities. Based on big data analysis algorithm, this paper constructs an experimental intelligent security management mode.","PeriodicalId":286364,"journal":{"name":"Conference on Computer Graphics, Artificial Intelligence, and Data Processing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130774509","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Boyi Zhang, Xinghua Liu, S. Ji, Xuejie Yang, Tongping Xie, Yang Yu, Fei Li
{"title":"Research and application of knowledge graph construction technology in the field of intelligent operation inspection of power transformer equipment","authors":"Boyi Zhang, Xinghua Liu, S. Ji, Xuejie Yang, Tongping Xie, Yang Yu, Fei Li","doi":"10.1117/12.2674813","DOIUrl":"https://doi.org/10.1117/12.2674813","url":null,"abstract":"The question answering method based on knowledge atlas has become a hot research field in natural language processing, and has been gradually applied in the field of electric power. In order to solve the problems such as the difficulty of using unstructured text data and the shallow application depth of equipment knowledge, which exist in the process of power operation and maintenance personnel carrying out transformer equipment inspection, this paper puts forward the technical framework of transformer equipment knowledge map, adopts the intelligent identification and extraction method of structured text, and establishes the calculation model of equipment semantic similarity. On this basis, this paper verifies the functions of automatic audit of transformer equipment status evaluation report, auxiliary diagnosis and recognition of equipment fault knowledge. The experimental results show that the recognition method based on knowledge atlas improves the accuracy of fault defect text recognition, and provides a new idea for improving the operation and maintenance efficiency of field equipment.","PeriodicalId":286364,"journal":{"name":"Conference on Computer Graphics, Artificial Intelligence, and Data Processing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132506702","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A smart site management platform based on IoT and QR code","authors":"Yingn Luo, Zhiquan Luo, Zhuoqian Liang","doi":"10.1117/12.2674640","DOIUrl":"https://doi.org/10.1117/12.2674640","url":null,"abstract":"Aiming at the problems of low level of informationization, high risk of construction safety and waste of resources due to lack of information management in traditional construction industry, this paper proposes to design and implement a set of smart site management platform based on IoT and QR code. The platform realizes the monitoring of load-bearing tower cranes and other equipment on construction sites with the help of IOT devices, and receives real-time alarm signals of over-limit or interference collision of tower cranes, which reduces the safety risk; realizes the remote control of over-limit alarm and switch of electricity equipment in office and living areas, which avoids energy waste. At the same time, the system combines QR code technology to realize the information tracking of maintenance orders by supervisors, simplifying their process of declaring faults and dealing with safety hazards, and improving construction efficiency and project quality.","PeriodicalId":286364,"journal":{"name":"Conference on Computer Graphics, Artificial Intelligence, and Data Processing","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130489616","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}