{"title":"Abnormal behavior identification of examinees based on improved YOLOv5","authors":"Jianfeng Wen, YiHai Qin, Sha Hu","doi":"10.1117/12.2674630","DOIUrl":"https://doi.org/10.1117/12.2674630","url":null,"abstract":"Traditional examination rooms rely on invigilators to monitor examinees in real time and use cameras to help invigilate the exam, which is prone to problems such as incomplete monitoring, inadequate response to cheating. This paper builds an abnormal behavior recognition model in examination room based on LOLOv5 and the cascading attention mechanism. The model effectively improves the backbone network of YOLOv5, and combines the cascading attention mechanism to enhance the features. Finally, the model is tested on the self-created dataset. The results show that the examinees abnormal behavior detection results of the proposed model are P (92.53%), mAP (93.52%), fps (0.547). Compared with several classical abnormal behavior detection algorithms, the proposed algorithm has higher accuracy and recognition speed.","PeriodicalId":286364,"journal":{"name":"Conference on Computer Graphics, Artificial Intelligence, and Data Processing","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128774394","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Mechatronic intelligent control technology based on PLC technology","authors":"Lina Guo, Dayu Fang, Fengxia Tian","doi":"10.1117/12.2674656","DOIUrl":"https://doi.org/10.1117/12.2674656","url":null,"abstract":"Up to now, PLC output power is getting higher and higher, creating more favorable conditions for PLC control coil. With the maturity of sensing technology, the level of manipulator assembly operation is enhanced. The application of electromechanical intelligent(EI) control technology based on PLC technology is studied and analyzed in this paper. It takes YL-235A optical EI equipment as the research object, introduces its basic working process, introduces the hardware composition, electrical control composition, software required for work and use requirements of YL-235A optical EI training equipment in detail, and finally discusses the overall working process and requirements of the equipment in detail, and discusses the application of EI intelligent control technology of PLC technology.","PeriodicalId":286364,"journal":{"name":"Conference on Computer Graphics, Artificial Intelligence, and Data Processing","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126570008","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Risk assessment model of Internet of Things based on BP neural network algorithm","authors":"W. Yan","doi":"10.1117/12.2674643","DOIUrl":"https://doi.org/10.1117/12.2674643","url":null,"abstract":"The internet of things (IOT) is a novel concept. With the rapid development of wireless communication technology, it has quickly become a hot topic. Its basic concept is to communicate, communicate and cooperate with each other around all kinds of things and objects around us through the unique address mode in the world, so as to achieve the common goal. Through in-depth research and investigation, it is found that at present, most banks in China generally adopt the scoring system for personal credit risk assessment (RBI), and the assessment indicators have not kept pace with the times for many years, and basically there is no big change. Obviously, this evaluation method is highly subjective, and the evaluation indicators are relatively backward, slightly rigid and single. In this regard, this paper studies the relatively mature evaluation criteria and methods in the field of information security, and analyzes the information security status of small IOT systems. Integrate the information security features of the IOT to construct a RBI index system for small IOT systems.","PeriodicalId":286364,"journal":{"name":"Conference on Computer Graphics, Artificial Intelligence, and Data Processing","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122332950","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An improved approach to privacy data protection in the body area network","authors":"Weixing Wang, Liuqin Ye","doi":"10.1117/12.2674623","DOIUrl":"https://doi.org/10.1117/12.2674623","url":null,"abstract":"Wireless Body Area Network (WBAN) is radio frequency-based wireless network technology. It is currently widely used in sports, medical health and other fields. WBAN often transmits the user's body monitoring data, such as heart rate, pulse, blood pressure and other personal privacy data. These sensitive data are bound to face a serious risk of data leakage or malicious tampering. In order to solve the privacy security of user data in WBAN environment, this paper proposes an improved privacy protection strategy. This strategy selects a portion of the region so that the phantom nodes are evenly distributed around the source nodes, and the adjacent packet space has a certain angle, in addition to increasing the diversity of the path from the source node to the base station by selecting the peer node. The simulation results show that the strategy can provide better privacy data protection without adding too many child nodes, and extend the security time.","PeriodicalId":286364,"journal":{"name":"Conference on Computer Graphics, Artificial Intelligence, and Data Processing","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121694059","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Ship detection in SAR image based on improved YOLOv5 network","authors":"Cheng-ge Fang, Ying Bi, Zhen Wu, Hui Wang, Ziwei Chen","doi":"10.1117/12.2674533","DOIUrl":"https://doi.org/10.1117/12.2674533","url":null,"abstract":"In order to improve the accuracy of YOLO series algorithm in detecting small ship targets in SAR images, a target detection algorithm based on improved yolov5 is proposed in this paper. In this paper, The Multi-Scale Channel Attention Module (MS_CAM) is added to the network structure to aggregate local and global feature information in the way of channel attention, which can alleviate the problem of large semantic gap between different scales to a certain extent. In addition, the PANet fusion structure in YOLOv5 was replaced by BiFPN structure to make the network better weight of learning features. The experiment on the open RSDD-SAR dataset shows that compared with the traditional method, the AP value and recall rate of the whole dataset are improved.","PeriodicalId":286364,"journal":{"name":"Conference on Computer Graphics, Artificial Intelligence, and Data Processing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121843302","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on a model of air defense fire distribution ring","authors":"Yong Sun, Shaopan Zhang, Guangzhao Lu, Jinqing Zhao, Jian-Xin Tian, Ji-rong Xue","doi":"10.1117/12.2674840","DOIUrl":"https://doi.org/10.1117/12.2674840","url":null,"abstract":"Fire distribution simulation is an extensive research topic, which belongs to the important research content of system of systems confrontation simulation. This paper presents a model of air defense fire distribution loop, which is relatively efficient, convenient and reliable, and can be used to guide the implementation of related algorithms. The computational fire distribution loop model includes the calculation of target distribution line and target distribution loop. This model can realize the effective distribution of air defense fire to targets. This model can guide the analysis of fire superiority and the calculation of automatic fire distribution. Combined with the actual project, good results have been achieved.","PeriodicalId":286364,"journal":{"name":"Conference on Computer Graphics, Artificial Intelligence, and Data Processing","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132193334","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Fuzhou destination image perception study: based on machine learning LDA model and SVM model","authors":"Ronghui Liu, Jinhuang Lin, Qianqian Wei, Qingquan Jiang","doi":"10.1117/12.2674702","DOIUrl":"https://doi.org/10.1117/12.2674702","url":null,"abstract":"The image shaping of tourist attractions is one of the important factors to attract tourists. This paper explores the perceived impression of Fuzhou in tourists' mind and the perceived dimensions of tourists' attention by studying the review texts of tourists when they visit Fuzhou. By collecting reviews about Fuzhou on Tongcheng.com, Ctrip.com, and Donkey Mama, the destination image of Fuzhou is obtained through LDA (Latent Dirichlet Allocation) theme modeling model and SVM (Support Vector Machine) sentiment analysis model text data mining, so as to objectively extract the perceptual dimensions of tourists when visiting Fuzhou. The study found that the perceptual dimensions that tourists focus on during their visit to Fuzhou are mainly, namely, \"tourism services,\" \"entrance fee,\" \"human landscape,\" \"natural landscape;\" \"natural scenery,\" \"history and culture,\" and \"activity experience\". The results of the study have some reference significance for Fuzhou in construction and promotion.","PeriodicalId":286364,"journal":{"name":"Conference on Computer Graphics, Artificial Intelligence, and Data Processing","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134633113","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Occlusion face recognition based on improved attention mechanism","authors":"Mai Fu, Zhihui Wang, Daoerji Fan, Huijuan Wu","doi":"10.1117/12.2674629","DOIUrl":"https://doi.org/10.1117/12.2674629","url":null,"abstract":"Due to the new crown and other epidemic diseases that make people wear masks to travel, the accuracy of the original face recognition system is affected. To address this challenge, a mask-wearing face recognition system based on an improved attention mechanism is proposed. First, Adding a maximum pooling operation to the CA (Coordinate Attention) attention module, then, placing attention module in the residual unit to form a feature extraction network. LResNet18E-IR is selected as the backbone network. Finally, the ArcFace loss and occlusion probability loss are combined to establish a multi-task network, which further promotes the accuracy of occluded face recognition. The results demonstrate that the system effectively increases the recognition accuracy of masked face and maintains almost the same accuracy as the original model on the unmasked dataset.","PeriodicalId":286364,"journal":{"name":"Conference on Computer Graphics, Artificial Intelligence, and Data Processing","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124255561","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Study on diesel spray characteristics based on image processing","authors":"Bingbing Liu, Yue Li, Feng Chen","doi":"10.1117/12.2674520","DOIUrl":"https://doi.org/10.1117/12.2674520","url":null,"abstract":"Based on MATLAB, a processing method which can accurately measure the spray characteristic parameters in the image was proposed, including background difference, image enhancement, threshold segmentation, edge detection, morphological operation and other algorithms. The macroscopic characteristic parameters of spray were extracted, and the variation rules of penetration distance and spray cone angle under different factors were analyzed. It is found that under the conditions of 140 MPa and 160 MPa injection pressure, 1 MPa and 2 MPa back pressure, and 0.315 mm and 0.366 mm nozzle diameter, with the increase of spray pressure, penetration distance increases and spray cone angle decreases. The penetration distance and cone angle decrease with the increase of hole diameter. The cone angle increased with the increase of back pressure, and the penetration distance showed the opposite trend.","PeriodicalId":286364,"journal":{"name":"Conference on Computer Graphics, Artificial Intelligence, and Data Processing","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133804229","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Quantitative refueling action recognition algorithm","authors":"Lei Wang, Dasheng Guan, Cong Liu, Zhijun Zhang","doi":"10.1117/12.2674614","DOIUrl":"https://doi.org/10.1117/12.2674614","url":null,"abstract":"An algorithm for identifying the action of quantitative refueling that can be deployed to edge equipment is proposed for the problem that refueling' action in production scenarios is not subject to real-time supervision. The algorithm firstly uses a YOLOv5s-improved object detection network for rapid human detection, then uses a tracking algorithm that combines IOU and histogram similarity to track the detected human. The traced sequence images are used to predict the skeletal key-point sequence of the human body through a quantitative pose estimation network, and finally, the skeletal key-point sequence data is input into the fully-connected network classifier on the sixth floor for action classification, to determine whether the refueling's actions are normally completed. Experimental data show that the algorithm greatly reduces the network weight and calculation amount. The human body detection speed on the BITMAIN Sophon SE5 terminal can reach 18 ms, and the action detection accuracy can reach 95.92% on the actual scene dataset.","PeriodicalId":286364,"journal":{"name":"Conference on Computer Graphics, Artificial Intelligence, and Data Processing","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121560359","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}