{"title":"Abnormal behavior identification of examinees based on improved YOLOv5","authors":"Jianfeng Wen, YiHai Qin, Sha Hu","doi":"10.1117/12.2674630","DOIUrl":"https://doi.org/10.1117/12.2674630","url":null,"abstract":"Traditional examination rooms rely on invigilators to monitor examinees in real time and use cameras to help invigilate the exam, which is prone to problems such as incomplete monitoring, inadequate response to cheating. This paper builds an abnormal behavior recognition model in examination room based on LOLOv5 and the cascading attention mechanism. The model effectively improves the backbone network of YOLOv5, and combines the cascading attention mechanism to enhance the features. Finally, the model is tested on the self-created dataset. The results show that the examinees abnormal behavior detection results of the proposed model are P (92.53%), mAP (93.52%), fps (0.547). Compared with several classical abnormal behavior detection algorithms, the proposed algorithm has higher accuracy and recognition speed.","PeriodicalId":286364,"journal":{"name":"Conference on Computer Graphics, Artificial Intelligence, and Data Processing","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128774394","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Mechatronic intelligent control technology based on PLC technology","authors":"Lina Guo, Dayu Fang, Fengxia Tian","doi":"10.1117/12.2674656","DOIUrl":"https://doi.org/10.1117/12.2674656","url":null,"abstract":"Up to now, PLC output power is getting higher and higher, creating more favorable conditions for PLC control coil. With the maturity of sensing technology, the level of manipulator assembly operation is enhanced. The application of electromechanical intelligent(EI) control technology based on PLC technology is studied and analyzed in this paper. It takes YL-235A optical EI equipment as the research object, introduces its basic working process, introduces the hardware composition, electrical control composition, software required for work and use requirements of YL-235A optical EI training equipment in detail, and finally discusses the overall working process and requirements of the equipment in detail, and discusses the application of EI intelligent control technology of PLC technology.","PeriodicalId":286364,"journal":{"name":"Conference on Computer Graphics, Artificial Intelligence, and Data Processing","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126570008","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Risk assessment model of Internet of Things based on BP neural network algorithm","authors":"W. Yan","doi":"10.1117/12.2674643","DOIUrl":"https://doi.org/10.1117/12.2674643","url":null,"abstract":"The internet of things (IOT) is a novel concept. With the rapid development of wireless communication technology, it has quickly become a hot topic. Its basic concept is to communicate, communicate and cooperate with each other around all kinds of things and objects around us through the unique address mode in the world, so as to achieve the common goal. Through in-depth research and investigation, it is found that at present, most banks in China generally adopt the scoring system for personal credit risk assessment (RBI), and the assessment indicators have not kept pace with the times for many years, and basically there is no big change. Obviously, this evaluation method is highly subjective, and the evaluation indicators are relatively backward, slightly rigid and single. In this regard, this paper studies the relatively mature evaluation criteria and methods in the field of information security, and analyzes the information security status of small IOT systems. Integrate the information security features of the IOT to construct a RBI index system for small IOT systems.","PeriodicalId":286364,"journal":{"name":"Conference on Computer Graphics, Artificial Intelligence, and Data Processing","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122332950","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An improved approach to privacy data protection in the body area network","authors":"Weixing Wang, Liuqin Ye","doi":"10.1117/12.2674623","DOIUrl":"https://doi.org/10.1117/12.2674623","url":null,"abstract":"Wireless Body Area Network (WBAN) is radio frequency-based wireless network technology. It is currently widely used in sports, medical health and other fields. WBAN often transmits the user's body monitoring data, such as heart rate, pulse, blood pressure and other personal privacy data. These sensitive data are bound to face a serious risk of data leakage or malicious tampering. In order to solve the privacy security of user data in WBAN environment, this paper proposes an improved privacy protection strategy. This strategy selects a portion of the region so that the phantom nodes are evenly distributed around the source nodes, and the adjacent packet space has a certain angle, in addition to increasing the diversity of the path from the source node to the base station by selecting the peer node. The simulation results show that the strategy can provide better privacy data protection without adding too many child nodes, and extend the security time.","PeriodicalId":286364,"journal":{"name":"Conference on Computer Graphics, Artificial Intelligence, and Data Processing","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121694059","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Ship detection in SAR image based on improved YOLOv5 network","authors":"Cheng-ge Fang, Ying Bi, Zhen Wu, Hui Wang, Ziwei Chen","doi":"10.1117/12.2674533","DOIUrl":"https://doi.org/10.1117/12.2674533","url":null,"abstract":"In order to improve the accuracy of YOLO series algorithm in detecting small ship targets in SAR images, a target detection algorithm based on improved yolov5 is proposed in this paper. In this paper, The Multi-Scale Channel Attention Module (MS_CAM) is added to the network structure to aggregate local and global feature information in the way of channel attention, which can alleviate the problem of large semantic gap between different scales to a certain extent. In addition, the PANet fusion structure in YOLOv5 was replaced by BiFPN structure to make the network better weight of learning features. The experiment on the open RSDD-SAR dataset shows that compared with the traditional method, the AP value and recall rate of the whole dataset are improved.","PeriodicalId":286364,"journal":{"name":"Conference on Computer Graphics, Artificial Intelligence, and Data Processing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121843302","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on a model of air defense fire distribution ring","authors":"Yong Sun, Shaopan Zhang, Guangzhao Lu, Jinqing Zhao, Jian-Xin Tian, Ji-rong Xue","doi":"10.1117/12.2674840","DOIUrl":"https://doi.org/10.1117/12.2674840","url":null,"abstract":"Fire distribution simulation is an extensive research topic, which belongs to the important research content of system of systems confrontation simulation. This paper presents a model of air defense fire distribution loop, which is relatively efficient, convenient and reliable, and can be used to guide the implementation of related algorithms. The computational fire distribution loop model includes the calculation of target distribution line and target distribution loop. This model can realize the effective distribution of air defense fire to targets. This model can guide the analysis of fire superiority and the calculation of automatic fire distribution. Combined with the actual project, good results have been achieved.","PeriodicalId":286364,"journal":{"name":"Conference on Computer Graphics, Artificial Intelligence, and Data Processing","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132193334","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Fuzhou destination image perception study: based on machine learning LDA model and SVM model","authors":"Ronghui Liu, Jinhuang Lin, Qianqian Wei, Qingquan Jiang","doi":"10.1117/12.2674702","DOIUrl":"https://doi.org/10.1117/12.2674702","url":null,"abstract":"The image shaping of tourist attractions is one of the important factors to attract tourists. This paper explores the perceived impression of Fuzhou in tourists' mind and the perceived dimensions of tourists' attention by studying the review texts of tourists when they visit Fuzhou. By collecting reviews about Fuzhou on Tongcheng.com, Ctrip.com, and Donkey Mama, the destination image of Fuzhou is obtained through LDA (Latent Dirichlet Allocation) theme modeling model and SVM (Support Vector Machine) sentiment analysis model text data mining, so as to objectively extract the perceptual dimensions of tourists when visiting Fuzhou. The study found that the perceptual dimensions that tourists focus on during their visit to Fuzhou are mainly, namely, \"tourism services,\" \"entrance fee,\" \"human landscape,\" \"natural landscape;\" \"natural scenery,\" \"history and culture,\" and \"activity experience\". The results of the study have some reference significance for Fuzhou in construction and promotion.","PeriodicalId":286364,"journal":{"name":"Conference on Computer Graphics, Artificial Intelligence, and Data Processing","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134633113","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Safety assessment of navigation environment in waterway based on extension matter-element","authors":"Xin Wen","doi":"10.1117/12.2674655","DOIUrl":"https://doi.org/10.1117/12.2674655","url":null,"abstract":"With the continuous development of maritime transportation, the flow of ships and the density of navigation are growing continuously. The traffic of ships is getting busier. As a result, the number of maritime traffic accidents is more than before, and the navigation environment is becoming more complex. Therefore, it is necessary to make a scientific and reasonable assessment. This paper identifies the factors that affect the safe navigation of channels from the perspective of navigation environment in a traditional system engineering way. In addition, this paper pursues establishing a model based on extension matter-element theory for these factors, combined with AHP method, to evaluate the safety of the traffic navigation environment of channels. 3 channels of the Ningbo Zhoushan Port are selected as an example to verify the accuracy of the model. The safety assessment results of Ningbo Zhoushan port show that they are all of low risk. Finally, it is concluded that the matter-element model is accurate for navigation environment safety assessment.","PeriodicalId":286364,"journal":{"name":"Conference on Computer Graphics, Artificial Intelligence, and Data Processing","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115214157","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Attribution analysis on the changing trend of sesame yield data in southern Henan under climate change","authors":"Meng Zhou, Haijiao Liu, Jie Zhang, Guoqiang Li, Hecang Zang, Yajie Qiu, Qing-Hua Zhao, Xiuzhong Yang, Jiantao Zhang, Gu Zheng","doi":"10.1117/12.2674617","DOIUrl":"https://doi.org/10.1117/12.2674617","url":null,"abstract":"Analyzing the characteristics of climate change and clarifying the critical climate factors affecting sesame yield are significant for sesame production to cope with future climate change and ensure stable yield and income increase. In this study, trend analysis and mutation analysis were used to study the changing trends of climatic factors, yield per unit area, and climatic yield. The data included meteorological and sesame yield data in Zhumadian City of Henan Province from 1989 to 2018. The stepwise regression model was used to extract critical climate factors, and multiple regression models of sesame climate yield and critical climate factors were established. The contribution rates to sesame yield of the critical climate factors affecting sesame yield were determined. The results showed as follows: from 1989 to 2018, the temperature during the sesame growing period in Henan Province showed an increasing trend, and the minimum temperature showed the most apparent increasing trend, with an average annual increase of 0.03℃. The decreasing trend of precipitation and sunshine duration in the sesame growing period was insignificant, but the inter-annual fluctuation was significant. The coefficient of variation was 40.8% and 15.41%, respectively. The yield per unit area of sesame showed a significant increasing trend, and the annual growth rate was 34.08kg·hm-2. The rising trend of climate yield is not adequate. The critical climate factors affecting sesame climatic yield were sunshine duration and average temperature. The contribution rate of each climate factor to climate yield in each growth period was ranked from the largest to the smallest as the average temperature at the seedling stage, the sunshine duration at the maturity stage, and the sunshine duration at the emergence stage. We have developed a future climate change adaptation strategy for the region based on the findings. The following measures should be taken to produce high-yield and high-quality sesame in south Henan Province. Local production departments should conduct training on high-yield cultivation techniques such as early sowing of sesame and risk management of waterlogging. Research institutions accelerated the selection, demonstration, and promotion of improved sesame seeds. The government has issued preferential agricultural policies.","PeriodicalId":286364,"journal":{"name":"Conference on Computer Graphics, Artificial Intelligence, and Data Processing","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115577740","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Optimization of multi-objective fresh food e-commerce delivery route with fuzzy time window","authors":"Jiajie Li","doi":"10.1117/12.2674681","DOIUrl":"https://doi.org/10.1117/12.2674681","url":null,"abstract":"In order to optimize the B2C fresh food delivery process of \"home\" mode of merchant self-operated delivery, this paper takes the highest customer satisfaction and minimum total cost as the goal, and considers the characteristics of instant logistics fresh food delivery and the real-time order in the condition of the delivery orders arrive in real time. A multiobjective vehicle routing optimization model with fuzzy time window for instant logistics fresh food delivery was constructed. According to the idea of single-order distribution, an improved ant colony algorithm based on rolling timedomain delayed distribution was designed to solve the problem, and the optimal combination of distribution cost and customer satisfaction was obtained.","PeriodicalId":286364,"journal":{"name":"Conference on Computer Graphics, Artificial Intelligence, and Data Processing","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114873064","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}