2022 5th International Conference on Advanced Electronic Materials, Computers and Software Engineering (AEMCSE)最新文献

筛选
英文 中文
Similarity Search Method of Hydrological Time Series based on Fragment Alignment Distance and Dynamic Time Warping 基于片段对齐距离和动态时间翘曲的水文时间序列相似性搜索方法
Jiaqi Yang, D. Wan, Yufeng Yu
{"title":"Similarity Search Method of Hydrological Time Series based on Fragment Alignment Distance and Dynamic Time Warping","authors":"Jiaqi Yang, D. Wan, Yufeng Yu","doi":"10.1109/AEMCSE55572.2022.00051","DOIUrl":"https://doi.org/10.1109/AEMCSE55572.2022.00051","url":null,"abstract":"In hydrological time series mining, hydrological time series similarity mining is an important aspect. To search hydrological time series more effectively, this paper proposes a fast search method for hydrological time series from the perspective of time series trend characteristics. Based on wavelet transform, feature point extraction, and semantic symbolization of time series, the preliminary candidate set is screened by semantic similarity matching, the first M approximate matching sequences with small fragment alignment distance in the preliminary candidate set are selected, and the first M approximate subsequences are accurately matched by dynamic time warping distance to obtain the final similar sequence. The water level data of the Tunxi station in the Tunxi basin are used in the experiment, and the results show that the proposed method can greatly improve the search efficiency while ensuring accuracy.","PeriodicalId":309096,"journal":{"name":"2022 5th International Conference on Advanced Electronic Materials, Computers and Software Engineering (AEMCSE)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125540834","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Prediction model of urban epidemic prevention and control based on multivariate Bi-A-LSTM 基于多元Bi-A-LSTM的城市疫情防控预测模型
Chang Yuan, Zhi-yuan Shi
{"title":"Prediction model of urban epidemic prevention and control based on multivariate Bi-A-LSTM","authors":"Chang Yuan, Zhi-yuan Shi","doi":"10.1109/AEMCSE55572.2022.00047","DOIUrl":"https://doi.org/10.1109/AEMCSE55572.2022.00047","url":null,"abstract":"The Novel Coronavirus outbreak has since spread rapidly across the globe, seriously affecting the quality of life and economic development of all countries. By predicting the epidemic situation in a certain area, government departments can take corresponding measures to prevent and control the epidemic according to the forecast results. However, with the implementation of various prevention and control measures, vaccination and the impact of virus mutation, the traditional epidemic model and regression model have limitations in the prediction performance, there is a large error in the prediction accuracy. To improve the prediction accuracy, this paper proposes an Attentional mechanism-based LSTM network (A-LSTM), which takes the multiple factors affecting the epidemic trend as the input of the model. Bidirectional A-LSTM is constructed by a-LSTM neural network unit, and the best fitting degree is obtained by training in bidirectional A-LSTM network. Multivariate Bi-A-LSTM epidemic prevention and control prediction model was obtained. In this paper, the actual data as reference, the average absolute error, average absolute percentage error, root mean square error as the evaluation index of the model, and the improved model and other models are compared, experimental results show that the improved model is more accurate than the traditional model in prediction accuracy.","PeriodicalId":309096,"journal":{"name":"2022 5th International Conference on Advanced Electronic Materials, Computers and Software Engineering (AEMCSE)","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126290208","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Abnormal electricity detection method based on multi-dimensional unsupervised learning 基于多维无监督学习的异常电检测方法
Tianyu Pang, Yi Wu, Naiwang Guo, Yingjie Tian
{"title":"Abnormal electricity detection method based on multi-dimensional unsupervised learning","authors":"Tianyu Pang, Yi Wu, Naiwang Guo, Yingjie Tian","doi":"10.1109/AEMCSE55572.2022.00018","DOIUrl":"https://doi.org/10.1109/AEMCSE55572.2022.00018","url":null,"abstract":"In order to reduce the operation cost of power companies and assist the marketing inspection management in more efficient power consumption inspection, evidence collection, analysis and treatment, aiming at non-technical loss (NTL), this paper proposes an abnormal power consumption detection method combining \"algorithm anomaly analysis\" and \"empirical method principle analysis\". \"Algorithm anomaly analysis\" uses local outlier factor algorithm to detect from four perspectives: community evolution anomaly, group behavior anomaly, individual power anomaly and association feature anomaly. \"Rule of thumb analysis\" further screens the results of \"algorithm anomaly analysis\" from the perspective of three-phase voltage and current imbalance correction. The experimental results show that compared with the existing mainstream abnormal power consumption detection methods, the proposed method can more accurately diagnose the abnormal power consumption behavior of users from power big data.","PeriodicalId":309096,"journal":{"name":"2022 5th International Conference on Advanced Electronic Materials, Computers and Software Engineering (AEMCSE)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121935817","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on parametric optimization of daylighting in university teaching building 高校教学楼采光参数优化研究
Meng Wang, Da-Xing Chen, Zi-He Zhang, Qiang Ma, Yu-Cheng Ren
{"title":"Research on parametric optimization of daylighting in university teaching building","authors":"Meng Wang, Da-Xing Chen, Zi-He Zhang, Qiang Ma, Yu-Cheng Ren","doi":"10.1109/aemcse55572.2022.00111","DOIUrl":"https://doi.org/10.1109/aemcse55572.2022.00111","url":null,"abstract":"in teaching buildings, good daylighting has a great impact on students' learning. The author tested the daylighting of the teaching building of Shihezi University and found that the daylighting coefficient of the teaching building can not meet the standard requirements, and the lighting distribution in the teaching space is uneven. The author uses the grasshopper platform and the octopus plug-in of genetic algorithm to carry out multi-objective optimization. The shape of the outer window and the high window close to the corridor wall are taken as variables, and the optimization is carried out with the goal of the maximum daylighting coefficient and the minimum uniformity of indoor daylighting distribution. The strategy is given according to the experiment.","PeriodicalId":309096,"journal":{"name":"2022 5th International Conference on Advanced Electronic Materials, Computers and Software Engineering (AEMCSE)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121029608","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on consumer service quality based on hotel online reviews 基于酒店在线评论的消费者服务质量研究
Yutong Lu, Yanling Huang, Haitao Yu, Yu-Chen Lan
{"title":"Research on consumer service quality based on hotel online reviews","authors":"Yutong Lu, Yanling Huang, Haitao Yu, Yu-Chen Lan","doi":"10.1109/aemcse55572.2022.00168","DOIUrl":"https://doi.org/10.1109/aemcse55572.2022.00168","url":null,"abstract":"The development of Internet technology has changed the way of travel for tourists. More and more people get information from the Internet, which has brought great changes to the tourism industry. The same is true of hotels as a key industry in the tourism industry. How to stand out from the fiercely competitive market and meet the diverse needs of customers is an important issue at present. This paper takes the data of more than 140,000 Chinese reviews of five-star hotels in Chongqing on the \"Trip.com Group\" as the research object, uses machine learning algorithms to conduct topic mining and sentiment analysis, and analyzes customer needs and preferences according to the characteristics of online review texts. The results show that in addition to the location, meals, decoration, cleaning, housing facilities and other hardware facilities of the hotel, consumers pay more attention to the software facilities such as the service and attitude of hotel staff. The research reduces the risk of tourists’ purchase decision, provides an important reference for hotel managers to carry out management and marketing strategies, and expands the application of review big data and natural language processing in the hotel industry in the analysis of big data.","PeriodicalId":309096,"journal":{"name":"2022 5th International Conference on Advanced Electronic Materials, Computers and Software Engineering (AEMCSE)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126581405","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Community Structure Enhanced Community Detection Algorithm Based on Graph Compression 基于图压缩的社团结构增强社团检测算法
Shuxia Ren, Qinghao Wang
{"title":"Community Structure Enhanced Community Detection Algorithm Based on Graph Compression","authors":"Shuxia Ren, Qinghao Wang","doi":"10.1109/AEMCSE55572.2022.00021","DOIUrl":"https://doi.org/10.1109/AEMCSE55572.2022.00021","url":null,"abstract":"Community detection is the important tools which can discovering useful information hidden in complex networks. Most existing community detection algorithms have low detection accuracy on complex networks which community structures are unclear. In order to solve this problem, this paper proposes a community detection algorithm (CSEP). The algorithm first reduces the network size with graph compression, and then increases or deletes links between nodes to enhance the community structure in the network.","PeriodicalId":309096,"journal":{"name":"2022 5th International Conference on Advanced Electronic Materials, Computers and Software Engineering (AEMCSE)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126641113","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Power Internet Assets Security Threat Assessment based on the Cost of Security Protection 基于安全防护成本的电力互联网资产安全威胁评估
Wen Shen, Qian Guo, Pengfei Yu, Xu-Sheng Liu
{"title":"Power Internet Assets Security Threat Assessment based on the Cost of Security Protection","authors":"Wen Shen, Qian Guo, Pengfei Yu, Xu-Sheng Liu","doi":"10.1109/AEMCSE55572.2022.00042","DOIUrl":"https://doi.org/10.1109/AEMCSE55572.2022.00042","url":null,"abstract":"In recent years, with the extensive access to many devices and users in the power Internet environment, network exposure has increased, bringing serious challenges to the protection system characterized by boundary isolation. To address the problem that existing threat assessment methods do not consider the cost of security protection measures on the operation of existing systems, this paper proposes a threat assessment method based on the cost of security protection based on a multi-factor combination weight analysis model. The method introduces threat protection economic factors and threat protection efficiency factors to implement comprehensive threat assessment. Starting from the three dimensions of single asset (device), layer (network) and scenario (application), the threat scope factor, threat frequency factor, threat protection economic factor and threat protection efficiency factor are taken as evaluation factors, and the combined weight calculation model is used to conduct comprehensive threat assessment and further calculate the eigenvalues of the risk distribution and derive the risk distribution results. The method quantitatively evaluates the benefits and drawbacks of security protection measures in terms of both the economic impact of cyber-attacks on the electricity business and the impact of the implementation of protection measures on the efficiency of business operations. Compared to existing threat assessments, it considers not only the degree of harm caused by the attack, but also the economic cost of security protection, thus effectively avoiding the problem of over-investment.","PeriodicalId":309096,"journal":{"name":"2022 5th International Conference on Advanced Electronic Materials, Computers and Software Engineering (AEMCSE)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126992910","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Sentiment Analysis of Electric Power Domain based on Transfer Learning 基于迁移学习的电力域情感分析
Bo Zhang, Xiaoping Chen, Yu Ouyang, Yeping Gan, Bin Lyu, Qian Zhao, Chenguang Li
{"title":"Sentiment Analysis of Electric Power Domain based on Transfer Learning","authors":"Bo Zhang, Xiaoping Chen, Yu Ouyang, Yeping Gan, Bin Lyu, Qian Zhao, Chenguang Li","doi":"10.1109/AEMCSE55572.2022.00148","DOIUrl":"https://doi.org/10.1109/AEMCSE55572.2022.00148","url":null,"abstract":"Sentiment analysis is an essential part of the natural language processing domain. Currently, sentiment analysis is mainly applied to scenarios such as user tweets, film comments, and opinion analysis. These scenarios generally contain sufficient training data. However, for some scenarios that lack sufficient training data, their performance is often limited. For this reason, a sentiment analysis method based on transfer learning was proposed in this study. With self-attention and adversarial learning as the core framework, the method could be used to assist the learning of small-scale specific domain sentiment analysis by using sentiment data from the rest of the large-scale domains, thus achieving better sentiment analysis results in small-scale specific domains. In the experimental part, the electric power field was taken as an example. The relevant experimental results demonstrate the effectiveness of the proposed method.","PeriodicalId":309096,"journal":{"name":"2022 5th International Conference on Advanced Electronic Materials, Computers and Software Engineering (AEMCSE)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125674591","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Research and Implementation of ARP Attack Defense Software Based on SharpPcap 基于SharpPcap的ARP攻击防御软件的研究与实现
Wu Cheng, Kaiwen Yao, Jibin Yuan, Xiaoping Huang
{"title":"Research and Implementation of ARP Attack Defense Software Based on SharpPcap","authors":"Wu Cheng, Kaiwen Yao, Jibin Yuan, Xiaoping Huang","doi":"10.1109/aemcse55572.2022.00155","DOIUrl":"https://doi.org/10.1109/aemcse55572.2022.00155","url":null,"abstract":"With the rapid application of IPV6 technology, network protocols become more and more secure, but it is easy to ignore the network security of IPV4 protocol in LAN. Especially in the network environment of the company and the campus network, ARP attacks caused by the loopholes in the ARP protocol are still rampant. In order to solve the defense needs of PC in LAN, an ARP defense software is designed and developed by SharpPcap framework. Without affecting the communication quality of the existing network, the current network state is obtained by monitoring and capturing the data packets of the backbone link to facilitate users to monitor the current network state and defend ARP attacks.","PeriodicalId":309096,"journal":{"name":"2022 5th International Conference on Advanced Electronic Materials, Computers and Software Engineering (AEMCSE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129019177","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Effect of Sintering Temperature on Electrical Transport Properties of Bi0.5Sb1.5Te3 Thermoelectric Materials 烧结温度对Bi0.5Sb1.5Te3热电材料电输运性能的影响
Zhi-ling Bai, B. Qin
{"title":"Effect of Sintering Temperature on Electrical Transport Properties of Bi0.5Sb1.5Te3 Thermoelectric Materials","authors":"Zhi-ling Bai, B. Qin","doi":"10.1109/aemcse55572.2022.00025","DOIUrl":"https://doi.org/10.1109/aemcse55572.2022.00025","url":null,"abstract":"Bi<inf>0.5</inf>Sb<inf>1.5</inf>Te<inf>3</inf> thermoelectric materials were successfully obtained by vacuum solid-state reaction sintering method. The effects of different sintering temperatures on the electrical transport properties of Bi<inf>0.5</inf>Sb<inf>1.5</inf>Te<inf>3</inf> thermoelectric materials were investigated. The results show that the Seebeck coefficient of Bi<inf>0.5</inf>Sb<inf>1.5</inf>Te<inf>3</inf> compound increases first and then decreases with the increase of sintering temperature. The resistivity of Bi<inf>0.5</inf>Sb<inf>1.5</inf>Te<inf>3</inf> compound changes in wave shape with the increasing sintering temperature. The resistivity of Bio.5Sb1.5Te3 compound reaches the minimum value when the sintering temperature is 823K. With the increasing sintering temperature, the PF value of Bi<inf>0.5</inf>Sb<inf>1.5</inf>Te<inf>3</inf> compound increases first and then decreases. The PF value of Bi<inf>0.5</inf>Sb<inf>1.5</inf>Te<inf>3</inf> compound reaches the maximum value when the sintering temperature is 823K. Under five sintering temperature conditions of 723K, 773K, 823K, 873K, and 923K, the Bio.5Sb1.5Te3 compound prepared at 823K has the best electrical transport performance. When the sintering temperature is 823K, the Seebeck coefficient, resistivity and PF value of Bio.5Sb1.5Te3 compound are 231.893μV-K<sup>-1</sup>, 3.28mΩ•cm, 1639.46pW•m<sup>-1</sup>•K<sup>-2</sup>, respectively.","PeriodicalId":309096,"journal":{"name":"2022 5th International Conference on Advanced Electronic Materials, Computers and Software Engineering (AEMCSE)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127337135","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信