Xiaodong Lin, Xinzui Wang, Fucheng Cao, Yanli Yang
{"title":"Surgical Instrument Positioning System Based on Binocular Vision","authors":"Xiaodong Lin, Xinzui Wang, Fucheng Cao, Yanli Yang","doi":"10.1109/ISCTIS58954.2023.10213107","DOIUrl":"https://doi.org/10.1109/ISCTIS58954.2023.10213107","url":null,"abstract":"Surgical instrument positioning is the core component of the surgical navigation system, which determines the accuracy of the entire system. Based on the principle of binocular vision, a surgical instrument positioning system is proposed. The system uses colored balls as markers. First, the colored ball area is extracted through color segmentation, then the center coordinates of the markers in the left and right images are obtained through the proposed algorithm based on connected domain extraction and centroid calculation. The algorithm first extracts the connected domain in the image, excludes the non-marker areas by the area of the connected domain, and then calculates the center of the connected domain using the centroid formula. Next, the left and right centers are matched based on spatial position, and the centers' three-dimensional coordinates are obtained through three-dimensional reconstruction. Finally, the three-dimensional coordinates of the surgical instrument tip are indirectly obtained through the center 3D coordinates. The stability and accuracy tests were carried out for the system, the results show that the system has good stability and accuracy.","PeriodicalId":334790,"journal":{"name":"2023 3rd International Symposium on Computer Technology and Information Science (ISCTIS)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115626165","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
D. Shen, Li Chen, Qiang Li, Tong Chen, Fengfeng Zhao
{"title":"A Weighted Gauss-Seidel Iterative Algorithm with Fast Convergence","authors":"D. Shen, Li Chen, Qiang Li, Tong Chen, Fengfeng Zhao","doi":"10.1109/ISCTIS58954.2023.10213210","DOIUrl":"https://doi.org/10.1109/ISCTIS58954.2023.10213210","url":null,"abstract":"Unacceptable amounts of computation can be generated in massive multiple-input multiple-output (MIMO) systems with minimum mean squared error (MMSE) detection at the received side. A weighted Gauss-Seidel iterative algorithm with fast convergence is launched. The proposed algorithm uses a mixture of Conjugate Gradient and Jacobi iterations to select the optimal search direction. Then weighting factor is used to accelerate the traditional Gauss-Seidel iterative algorithm. The results show that the detection capability of the scheme has been improved. The theoretical analysis verifies that the proposed algorithm has a lower computational complexity compared to the MMSE algorithm. After simulation analysis, the recommended algorithm can gain better convergence speed and BER function with fewer iterations. If user antennas setting values is similar to base station antennas, the proposed algorithm is significantly better.","PeriodicalId":334790,"journal":{"name":"2023 3rd International Symposium on Computer Technology and Information Science (ISCTIS)","volume":"114 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117207853","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"LCD Graphic Element Location Method Combining NL-means and Local Threshold Segmentation","authors":"Xiaohui Wang, J. Tan","doi":"10.1109/ISCTIS58954.2023.10213011","DOIUrl":"https://doi.org/10.1109/ISCTIS58954.2023.10213011","url":null,"abstract":"Accurate positioning of screen primitives is crucial in the machine vision-based automatic detection of intelligent water meter LCD screens. Detecting edge details of the LCD screen using the A component of the LAB color space improves the accuracy of LCD screen area positioning. This approach reduces background interference from Gaussian noise, non-uniform lighting, specular reflection, and local highlights. This study proposes a technique that combines NL-means and Sauvola local threshold segmentation methods to locate LCD screen areas and graphics elements. The experimental results indicate that this technique satisfies the defect detection criteria for smart water meter LCD screens set by the enterprise. The LCD screen detection tool extracted a smart water meter LCD screen image with 98.4% accuracy in LCD screen element positioning. Compared to the median filter method, this represents a significant improvement, and the combination with the maximum between-class variance method further increases accuracy by 2.7%.","PeriodicalId":334790,"journal":{"name":"2023 3rd International Symposium on Computer Technology and Information Science (ISCTIS)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126046937","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Dueling DQN-Rollout for Collision Avoidance Path Planning with Vehicle Speed Location","authors":"Gujiayin Nian, Jingzhong Xiao, Xuchuan Zhou","doi":"10.1109/ISCTIS58954.2023.10213163","DOIUrl":"https://doi.org/10.1109/ISCTIS58954.2023.10213163","url":null,"abstract":"The rapid progress of artificial intelligence has led to significant advancements in the field of autonomous driving, yet effective collision avoidance path planning remains a challenging task. In response, deep reinforcement learning offers an efficient and modern alternative to traditional navigation strategies. This paper proposes a novel approach that incorporates vehicle speed location into the deep reinforcement learning process, utilizing the Dueling DQN-Rollout framework to consider both the distance of the road and obstacles ahead. The agent interacts with the environment to learn a policy, with a reward function that accounts for deviations from the intended path and collisions with obstacles. The training process focuses on imparting human-like driving skills to the autonomous vehicle. By employing the rollout algorithm, the rough Q-value is optimized to reduce training costs. Experimental results demonstrate that this approach can successfully plan a collision-free path for autonomous driving from origin to destination on a simulation platform.","PeriodicalId":334790,"journal":{"name":"2023 3rd International Symposium on Computer Technology and Information Science (ISCTIS)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125337860","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Method of Intelligent Extracting of Abnormal Data Under Computer Data Mining Technology","authors":"Yingmin Zhang, Shuo Li","doi":"10.1109/ISCTIS58954.2023.10213150","DOIUrl":"https://doi.org/10.1109/ISCTIS58954.2023.10213150","url":null,"abstract":"With the application of big data and other information technologies, enterprises and institutions have gradually formed massive data resources. How to intelligently extract abnormal data from the massive data resources is an urgent technical problem to be solved at present. This paper proposes a method of extracting abnormal data after normalization of massive data by using computer data mining technology. By comparing with other methods, it is proved that this method runs well and has high efficiency. It solves the problem of standardizing data resources and intelligently extracting abnormal data under the massive data in the era of big data.","PeriodicalId":334790,"journal":{"name":"2023 3rd International Symposium on Computer Technology and Information Science (ISCTIS)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115356444","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Qinpeng Chen, Bailiang Liu, Zhuoqi Liu, Jiaxu Song, Yucheng Liu
{"title":"Prediction of Wordle Game based on BP neural network optimization based on Grey Wolf algorithm","authors":"Qinpeng Chen, Bailiang Liu, Zhuoqi Liu, Jiaxu Song, Yucheng Liu","doi":"10.1109/ISCTIS58954.2023.10213079","DOIUrl":"https://doi.org/10.1109/ISCTIS58954.2023.10213079","url":null,"abstract":"In 2021, the word guessing game Wordle became an overnight hit around the world. It updated a different “inscription” every day, requiring players to guess a five-letter “inscription” within six times (more than six times deemed unsuccessful). This paper aims to use the BP neural network algorithm optimized by Grey Wolf algorithm to build a multi-input multi-output mathematical model through training and data analysis of the huge data set of Wordle game, and predict the number proportion distribution of future players on six guesses (1,2,3,4,5,6,X). This algorithm can reflect the improvement and enhancement of the prediction accuracy of BP neural network optimized by Grey Wolf algorithm compared with the traditional BP neural network, and show more powerful data processing ability, so as to extend the machine learning model to a wider range of prediction problems.","PeriodicalId":334790,"journal":{"name":"2023 3rd International Symposium on Computer Technology and Information Science (ISCTIS)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122810131","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Imbalanced radar micro-motion target classification based on k-means SMOTE and deep residual network","authors":"Xiaoyi Wang, Shuhao Zhang, Y. Zhang, Zhongjun Yu","doi":"10.1109/ISCTIS58954.2023.10213190","DOIUrl":"https://doi.org/10.1109/ISCTIS58954.2023.10213190","url":null,"abstract":"In the practical application of radar target classification based on deep learning, there are problems such as incomplete and imbalanced radar datasets making it difficult for deep learning to leverage its advantages. Based on these problems, an imbalanced radar micro-motion target classification method based on k-means SMOTE and deep residual network is proposed. Firstly, based on the imbalance of various target samples collected in practice, in order to make full use of the micro-motion features of targets, the K-means SMOTE algorithm is proposed to optimize and balance training datasets. Then, accurate classification of micro-motion radar targets is achieved based on the residual network, which uses the ResNeXt101 network as the core structure. Finally, based on measured radar target data, experimental verification is conducted. The experimental results show that compared to traditional deep learning direct object classification methods, the algorithm proposed in this paper can more effectively address the problem of data imbalance and achieve higher classification accuracy.","PeriodicalId":334790,"journal":{"name":"2023 3rd International Symposium on Computer Technology and Information Science (ISCTIS)","volume":"114 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117259221","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Xiaojiao Yang, Fangzuo Zhang, Yun He, Pei Liang, Jun Yang
{"title":"Human Intrusion Detection System using mm Wave Radar","authors":"Xiaojiao Yang, Fangzuo Zhang, Yun He, Pei Liang, Jun Yang","doi":"10.1109/ISCTIS58954.2023.10213143","DOIUrl":"https://doi.org/10.1109/ISCTIS58954.2023.10213143","url":null,"abstract":"Due to the giant advances in 5G technology and the Internet of Things, target detection and identification play increasingly significant roles in daily life. In this paper, a human intrusion detection system with high robustness based on mm Wave radar is built to solve the problem of regional rapid automatic human intrusion detection in complex environments. In the system, we propose a novel approach to rapidly identify human intrusion targets, mainly including feature extraction using 2D-FFT, MTI, CFAR, and clustering, and target identification based on SVM and point cloud. Experimental results indicate that the system has a success rate of exceeding 85% for human intrusion detection under different complex conditions, and has strong robustness in most scenarios.","PeriodicalId":334790,"journal":{"name":"2023 3rd International Symposium on Computer Technology and Information Science (ISCTIS)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128624341","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on Operating System Runtime Jitter Control Method for Electromagnetic Transient Real time Simulation Calculation","authors":"Q. Guo, Tianyu Guo, Yuanhong Lu, Haiping Guo, Libin Huang, Liang Tu","doi":"10.1109/ISCTIS58954.2023.10212991","DOIUrl":"https://doi.org/10.1109/ISCTIS58954.2023.10212991","url":null,"abstract":"Real-time electromagnetic transient simulation can quickly analyze and solve the problems in complex large-scale power systems, realize accurate prediction and diagnosis of faults, and is a necessary means to promote the implementation of new power systems. However, the real-time simulation of electromagnetic transient puts forward strict requirements for the real-time performance of the underlying operating system. In this paper, the test method of system runtime jitter on Linux platform is designed, and the causes of jitter are analyzed based on the test results, and the control method of runtime jitter is studied. The experimental results show that the jitter of the system can be controlled in nanosecond level after using the methods of interrupt shutdown, CPU core binding and configuration of NOHZ_FULL, which can meet the needs of real-time simulation of electromagnetic transient.","PeriodicalId":334790,"journal":{"name":"2023 3rd International Symposium on Computer Technology and Information Science (ISCTIS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129087306","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
You Zhang, Ke Yang, Yihan Wang, Pengyu Yang, Xiyuan Liu
{"title":"Speculative ECC and LCIM Enabled NUMA Device Core","authors":"You Zhang, Ke Yang, Yihan Wang, Pengyu Yang, Xiyuan Liu","doi":"10.1109/ISCTIS58954.2023.10213102","DOIUrl":"https://doi.org/10.1109/ISCTIS58954.2023.10213102","url":null,"abstract":"Advanced process technology allows high memory density while securing high bandwidth. However, the increasing disparity between the computing unit and memory known as the memory wall impedes applications like artificial intelligence (AI) related workloads. The larger area of the memory cell introduces more memory defects, and this causes a memory yield problem. Error-correction code (ECC) is a widely used technique in modern computer architecture for system robustness. The overhead introduced by ECC limits the performance in certain timing-critical applications, like caches. The real time ECC combined with in-memory computation shows great power in addressing the performance and power bottlenecks. This paper proposes a hardware architecture to support memory ECC speculative computing cache. The paper presents a memory structure that implements separate data memory and tag memory, breaking the serialization between data access and error detection. The data is fetched making the prediction that tag is correct and uncorrupted. The system is rolled back when the prediction is wrong. Further optimization involves in-memory computing, which saves memory bandwidth. The proposed ECC speculative computing cache also reduced power and area overhead by reusing the logic from the computing cache.","PeriodicalId":334790,"journal":{"name":"2023 3rd International Symposium on Computer Technology and Information Science (ISCTIS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129366673","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}