Conference on Computer Graphics, Artificial Intelligence, and Data Processing最新文献

筛选
英文 中文
Encryption method of electronic conference image based on mixed chaotic sequences 基于混合混沌序列的电子会议图像加密方法
Du Wang, Yongqiang Guo
{"title":"Encryption method of electronic conference image based on mixed chaotic sequences","authors":"Du Wang, Yongqiang Guo","doi":"10.1117/12.2674709","DOIUrl":"https://doi.org/10.1117/12.2674709","url":null,"abstract":"Because the image has the characteristics of large amount of information and high redundancy, the traditional AES, DES and other encryption methods applied to text and numbers can not be effective. Chaotic sequence algorithm has natural similarity with cryptography, such as extreme sensitivity to initial value, ergodicity, non-periodicity, pseudo-randomness and very high iterative rate. as a result, the encryption of chaotic sequence algorithm in the field of electronic conference image will be better than the traditional encryption method, and it has become a new direction to solve the problem of electronic conference image encryption. However, the limited computer accuracy will also reduce the randomness of chaotic sequences. in order to make up for this defect, this paper uses the idea of hybrid encryption to design a more secure and efficient hybrid chaotic sequence encryption algorithm.","PeriodicalId":286364,"journal":{"name":"Conference on Computer Graphics, Artificial Intelligence, and Data Processing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132759905","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
High-risk areas identification of transmission lines based on historical warning information 基于历史预警信息的输电线路高危区域识别
Fei Wang, Lingqi Kong
{"title":"High-risk areas identification of transmission lines based on historical warning information","authors":"Fei Wang, Lingqi Kong","doi":"10.1117/12.2674562","DOIUrl":"https://doi.org/10.1117/12.2674562","url":null,"abstract":"With the upgrade of transmission line maintenance technology, the visual remote inspection of transmission line channel is widely used. However, the application of these marked data is currently in the stage of statistical analysis and report form, a deeper data mining work has not been carried out, such as the identification of areas with high incidence of alarm. This paper presents a method of analysis of high risk area of transmission line channel based on historical early warning data, which can be applied to the field of transmission line maintenance. By preprocessing the transmission line visual alarm data, using the improved k-means algorithm, analyze the clustering results, and finding out the series of modeling and data analysis. In addition, when determining the initial points, we propose the maximum and minimum longitude and latitude coordinates of the alarm dataset, divide a certain number of longitude and latitude grid, obtain the candidate data within each grid, and the method of obtaining the initial point set after screening. Based on the initial point set, the alarm area distribution is reasonable, and the regional stability does not drift. This paper can identify the visual alarm data of transmission lines with high alarm incidence areas, and provide effective data support for maintenance personnel to guide the deployment of human resources and ensure the safe operation of transmission lines.","PeriodicalId":286364,"journal":{"name":"Conference on Computer Graphics, Artificial Intelligence, and Data Processing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115015426","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An integrated design method of robot intelligent joints based on artificial intelligence 基于人工智能的机器人智能关节集成设计方法
Lina Guo
{"title":"An integrated design method of robot intelligent joints based on artificial intelligence","authors":"Lina Guo","doi":"10.1117/12.2674672","DOIUrl":"https://doi.org/10.1117/12.2674672","url":null,"abstract":"Now, industrial robots are gradually popularized in the industrial scene, gradually replacing some tasks that were originally participated in. In order to solve the disadvantages of traditional robots, a series of new concepts such as flexibility, lightweight, integrated joints, and cooperative robots have emerged gradually, and finally the cooperative robot with integrated joints has become a mainstream direction today. In view of the rise of cooperative robots and the demand for integrated joints, this paper studies the integrated design(ID) method of robot intelligent joints based on artificial intelligence(AI). The development and modeling of modular joint and the hardware design of integrated joint robot are discussed; The modular joint was tested from different aspects, and the torque and positioning accuracy of the joint were tested to verify the functionality and applicability of the modular joint.","PeriodicalId":286364,"journal":{"name":"Conference on Computer Graphics, Artificial Intelligence, and Data Processing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124509208","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Semantic segmentation algorithm of underwater image based on improved DeepLab v3+ 基于改进DeepLab v3+的水下图像语义分割算法
Yongqi Yuan, Yubo Tian
{"title":"Semantic segmentation algorithm of underwater image based on improved DeepLab v3+","authors":"Yongqi Yuan, Yubo Tian","doi":"10.1117/12.2674688","DOIUrl":"https://doi.org/10.1117/12.2674688","url":null,"abstract":"Underwater images are easily affected by external factors such as light and water impurities, resulting in low segmentation accuracy of underwater images. Aiming to solve the problem, this paper proposes a semantic segmentation method of underwater images by introducing a new branch to improve the structure of the DeepLab v3+ model. It exploits the low-semantic features of the input image to improve the performance of the network. In the new branch, down-sampling is used to adjust the resolution of the input image, and the dimension of the feature map is adjusted by 1×1 convolution. The attention mechanism is used to focus on the channel of the feature map, and finally, the feature map of the existing branch is merged. In the experiments on the SUIM underwater dataset, the average intersection ratio of the model is 72.88%, and the average pixel accuracy is 84.03%. In the experiments on the PASCAL VOC dataset, the average intersection ratio of the model is 75.85%, and the average pixel accuracy is 84.5%. Compared with existing mainstream algorithms, the proposed algorithm achieves better results.","PeriodicalId":286364,"journal":{"name":"Conference on Computer Graphics, Artificial Intelligence, and Data Processing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124608042","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Artificial intelligence-based traditional Chinese medicine assistive diagnostic system: analysis of pulse parameters in patients with systemic lupus erythematosus and the factors influencing their Chinese medical evidence patterns 基于人工智能的中医辅助诊断系统:系统性红斑狼疮患者脉搏参数及中医循证模式影响因素分析
Cheng Pan, Aimin Gong, Fang-Zhi Wei, Xuan Zhang, Yitian Song
{"title":"Artificial intelligence-based traditional Chinese medicine assistive diagnostic system: analysis of pulse parameters in patients with systemic lupus erythematosus and the factors influencing their Chinese medical evidence patterns","authors":"Cheng Pan, Aimin Gong, Fang-Zhi Wei, Xuan Zhang, Yitian Song","doi":"10.1117/12.2674642","DOIUrl":"https://doi.org/10.1117/12.2674642","url":null,"abstract":"Objective: to analyze the characteristics of pulse pattern parameters of systemic lupus erythematosus (SLE) patients and the factors influencing their TCM patterns, and to provide an objective basis for their TCM pulse diagnosis and diagnosis. Methods: the SmartTCM-A1 TCM intelligent detection system was used to collect pulse diagnosis image information from 267 SLE patients (140 in the Yin deficiency internal heat evidence group, 96 in the heat toxin incandescence evidence group, and 31 in the rheumatic heat paralysis evidence group) and 130 healthy individuals, extract the image parameters of pulse diagnosis, and analyze the characteristics of pulse diagnosis parameters of SLE patients and their influencing factors of pulse diagnosis parameters of different TCM evidence types by logistic regression model. Results: ① compared with the healthy group, the pulse parameters h1 value, h4 value, and t1/t value were significantly higher in the SLE group (P<0.05) and the pulse parameter t value was significantly lower in the SLE group (P<0.05); logistic regression analysis showed that the independent influencing factors in SLE patients included: h4 value (OR=1.073; 95% CI=1.003-1.148 ;P<0.05), t-value (OR=0.003;95% CI=0.000-0.763;P<0.05) and t1/t-value (OR=0.000;95% CI=0.000- 1.199;P<0.05). ② Compared with the group with incandescent heat toxin evidence, the h4 value, h5 value, t4 value, t5 value, t5/t4 value were significantly lower in the group with Yin deficiency internal heat evidence (P<0.05), the h4/h1 value and t1/t4 value were significantly higher in the group with Yin deficiency internal heat evidence (P<0.05), the h4 value, h5 value, t5 value, h4/h1 value were significantly lower in the group with rheumatic heat paralysis evidence (P<0.05), and the t4 value, h5/h1 value, t5/t1 value were significantly lower in the group with rheumatic heat paralysis evidence (P<0.05). , h5/h1 values, and t1/t4 values were significantly higher in the rheumatism-heat paralysis group (P<0.05); logistic regression analysis. The results showed that the independent influencing factors of TCM evidence in SLE patients included: h3 values in the yin deficiency internal heat evidence group (OR=2.295; 95% CI=1.843-2.858; P<0.05) and h3 values in the rheumatic heat paralysis evidence group (OR=2.309; 95% CI=1.87-2.85; P<0.05). Conclusion: conclusion pulse diagnosis parameters h4 value, t value and t1/t value are one of the influencing factors for the diagnosis of SLE patients, and pulse diagnosis parameter h3 value is one of the influencing factors for the diagnosis of SLE Chinese medical evidence.","PeriodicalId":286364,"journal":{"name":"Conference on Computer Graphics, Artificial Intelligence, and Data Processing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129389115","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The improved clustering algorithm is used to analyze the data anomalies in the network environment 采用改进的聚类算法对网络环境中的数据异常进行分析
Xiaojia Lin
{"title":"The improved clustering algorithm is used to analyze the data anomalies in the network environment","authors":"Xiaojia Lin","doi":"10.1117/12.2674851","DOIUrl":"https://doi.org/10.1117/12.2674851","url":null,"abstract":"In this paper, an improved clustering algorithm is proposed and a heterogeneous model based on this model is developed. A new data extraction technology, such as data classification, network platform anomaly detection, distributed maximum frequent sequence extraction, comparison and mining of maximum frequent sequence data, is adopted. Through the comparison experiment, it is found that the algorithm can better reflect the correlation with the corresponding abnormal data types, and can better reflect the actual use of the algorithm.","PeriodicalId":286364,"journal":{"name":"Conference on Computer Graphics, Artificial Intelligence, and Data Processing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127169519","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A comparative study of deep learning methods for drilling performance prediction 钻井性能预测的深度学习方法比较研究
Tong Jiao, Ye Liu, Jie Cao, D. Sui
{"title":"A comparative study of deep learning methods for drilling performance prediction","authors":"Tong Jiao, Ye Liu, Jie Cao, D. Sui","doi":"10.1117/12.2674979","DOIUrl":"https://doi.org/10.1117/12.2674979","url":null,"abstract":"Rate of penetration is a key parameter to describe the efficiency of drilling through the formations and it has always been a measure of drilling efficiency. Previous research has demonstrated that machine learning can be applied to improve the prediction of ROP from conventional correlation approaches. More recently, deep learning models have also been used toward that purpose. In this research, the typical used machine learning methods and deep learning methods are tested and compared in terms of ROP prediction. An open-source drilling dataset is used for single well and multiple well modeling and testing. The results demonstrate that deep learning models have more general and accurate results, and LSTM shows solid prediction performance for both single well and multiple well cases. The accurate prediction model for ROP can be further applied for the planning phase and real-time operation optimization.","PeriodicalId":286364,"journal":{"name":"Conference on Computer Graphics, Artificial Intelligence, and Data Processing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127371972","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on laboratory intelligent security management mode based on big data and cloud services 基于大数据和云服务的实验室智能安全管理模式研究
Chang-Hun Ji
{"title":"Research on laboratory intelligent security management mode based on big data and cloud services","authors":"Chang-Hun Ji","doi":"10.1117/12.2674938","DOIUrl":"https://doi.org/10.1117/12.2674938","url":null,"abstract":"With the popularization of information technology, the proportion of universities in the field of scientific research investment has increased year by year, which is also mainly used for laboratory investment. With the continuous maturity of cloud service technology, intelligent laboratory management has become the main mode of university management, which will gradually replace the traditional manual management. Through various sensing devices, the intelligent laboratory can realize the intelligent management of equipment, personnel, safety and technical data, which is the main embodiment of intelligence. Research method: through the intelligent laboratory management and control platform, managers can directly intelligentized the management system and control the laboratory, which is the necessity of the laboratory intelligent security management mode. Through the intelligent system, managers can realize the standardization, process and informatization of technical data, which will improve the utilization and sharing rate of experimental equipment. This paper mainly refers to the literature survey and empirical research. Through the investigation of literature to obtain information, this paper comprehensively and correctly understand a method to master the problem to be studied. The literature research method is widely used in various disciplines. Through empirical research, this paper proposes a design mode using scientific instruments and equipment, which can be used to observe, record and measure the intelligent management mode of laboratories step by step. Conclusion: the development of laboratory intelligent security management mode based on big data and cloud services has become the development trend of university laboratory management, which is of great significance to improve the scientific research level of universities. Based on big data analysis algorithm, this paper constructs an experimental intelligent security management mode.","PeriodicalId":286364,"journal":{"name":"Conference on Computer Graphics, Artificial Intelligence, and Data Processing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130774509","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research and application of knowledge graph construction technology in the field of intelligent operation inspection of power transformer equipment 知识图谱构建技术在电力变压器设备智能运行检测领域的研究与应用
Boyi Zhang, Xinghua Liu, S. Ji, Xuejie Yang, Tongping Xie, Yang Yu, Fei Li
{"title":"Research and application of knowledge graph construction technology in the field of intelligent operation inspection of power transformer equipment","authors":"Boyi Zhang, Xinghua Liu, S. Ji, Xuejie Yang, Tongping Xie, Yang Yu, Fei Li","doi":"10.1117/12.2674813","DOIUrl":"https://doi.org/10.1117/12.2674813","url":null,"abstract":"The question answering method based on knowledge atlas has become a hot research field in natural language processing, and has been gradually applied in the field of electric power. In order to solve the problems such as the difficulty of using unstructured text data and the shallow application depth of equipment knowledge, which exist in the process of power operation and maintenance personnel carrying out transformer equipment inspection, this paper puts forward the technical framework of transformer equipment knowledge map, adopts the intelligent identification and extraction method of structured text, and establishes the calculation model of equipment semantic similarity. On this basis, this paper verifies the functions of automatic audit of transformer equipment status evaluation report, auxiliary diagnosis and recognition of equipment fault knowledge. The experimental results show that the recognition method based on knowledge atlas improves the accuracy of fault defect text recognition, and provides a new idea for improving the operation and maintenance efficiency of field equipment.","PeriodicalId":286364,"journal":{"name":"Conference on Computer Graphics, Artificial Intelligence, and Data Processing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132506702","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A smart site management platform based on IoT and QR code 基于物联网和二维码的智能站点管理平台
Yingn Luo, Zhiquan Luo, Zhuoqian Liang
{"title":"A smart site management platform based on IoT and QR code","authors":"Yingn Luo, Zhiquan Luo, Zhuoqian Liang","doi":"10.1117/12.2674640","DOIUrl":"https://doi.org/10.1117/12.2674640","url":null,"abstract":"Aiming at the problems of low level of informationization, high risk of construction safety and waste of resources due to lack of information management in traditional construction industry, this paper proposes to design and implement a set of smart site management platform based on IoT and QR code. The platform realizes the monitoring of load-bearing tower cranes and other equipment on construction sites with the help of IOT devices, and receives real-time alarm signals of over-limit or interference collision of tower cranes, which reduces the safety risk; realizes the remote control of over-limit alarm and switch of electricity equipment in office and living areas, which avoids energy waste. At the same time, the system combines QR code technology to realize the information tracking of maintenance orders by supervisors, simplifying their process of declaring faults and dealing with safety hazards, and improving construction efficiency and project quality.","PeriodicalId":286364,"journal":{"name":"Conference on Computer Graphics, Artificial Intelligence, and Data Processing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130489616","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信