{"title":"Big Data Mining Algorithm of Internet of Things Based on Artificial Intelligence Technology","authors":"W. Li","doi":"10.1109/ISAIEE57420.2022.00032","DOIUrl":"https://doi.org/10.1109/ISAIEE57420.2022.00032","url":null,"abstract":"According to the low accuracy of big data analysis and clustering of the Internet of Things at present, this paper proposes an AI based big data mining method for the Internet of Things. By establishing the dimension control mechanism, the data pattern tree of the Internet of Things is generated, and the data mining scope is initially obtained. The data that meet the requirements are detected according to big data information, and the standardized processing is completed for the clustered feature data. Finally, data mining results are obtained by using neural network technology. The experimental results show that the F -measure value can be increased by 15.01 % and 17.52%, and the RI value can be increased by 20.32% and 25.03%. The clustering accuracy of the algorithm is obviously improved.","PeriodicalId":345703,"journal":{"name":"2022 International Symposium on Advances in Informatics, Electronics and Education (ISAIEE)","volume":"108 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121751005","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Application of quantum algorithms in secret keys","authors":"Jiantang Zhang","doi":"10.1109/ISAIEE57420.2022.00030","DOIUrl":"https://doi.org/10.1109/ISAIEE57420.2022.00030","url":null,"abstract":"At present, quantum algorithm is a development direction of the early quantum algorithm in thinking. They are generally considered to be largely theoretical because the problems they solve are almost useless. In this paper, the applications of quantum algorithms in quantum key distribution, error correction, authentication and other fields are analyzed. Simon quantum algorithm benefits from the parallelism of quantum algorithms, and its fast finding function period property is used to construct a variety of attack forms, such as discrimination attack, key recovery attack, sliding attack, quantum forgery attack and so on. Simon algorithm uses register conversion to calculate the period in the process of key authentication, and applies this periodic feature to the interrogator in the process of key authentication, so as to achieve accurate key authentication.","PeriodicalId":345703,"journal":{"name":"2022 International Symposium on Advances in Informatics, Electronics and Education (ISAIEE)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121862820","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on Multi-level Student Achievement Analysis Method Based on Cluster Analysis","authors":"Na Wang, Minghai Yao, Jinsong Li","doi":"10.1109/ISAIEE57420.2022.00078","DOIUrl":"https://doi.org/10.1109/ISAIEE57420.2022.00078","url":null,"abstract":"Performance prediction can provide reference for teachers to improve teaching programs and students to improve learning methods. At present, most prediction methods use all students' grades to build prediction model, ignoring the multi-level characteristics of students. Therefore, a multi-level student achievement analysis method based on cluster analysis is proposed. Firstly, the sample data is clustered by affinity propagation clustering algorithm. Then, the prediction models are constructed for each sample. Finally, the corresponding prediction model is used to predict the performance. In order to verify the accuracy and efficiency of student achievement analysis, it is verified on the score data of college students of multiple majors. Through the experimental results we can see that the prediction accuracy of the Multi-level student achievement analysis algorithm based on cluster analysis is better.","PeriodicalId":345703,"journal":{"name":"2022 International Symposium on Advances in Informatics, Electronics and Education (ISAIEE)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122120570","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Development of VR Technology and Computer Technology Integration Application","authors":"Li Zhu, Yan Li, Lu Bai, Qingdi Yu, Mengqi Li","doi":"10.1109/ISAIEE57420.2022.00105","DOIUrl":"https://doi.org/10.1109/ISAIEE57420.2022.00105","url":null,"abstract":"With the progress and development of science and technology, virtual reality(VR) technology has been widely used in military, medical, aerospace, architectural design, entertainment and other fields. VR technology is a comprehensive computer graphics technology, which is composed of multimedia technology, human It is a technology developed by a variety of science and technology such as computer interaction technology, network technology, stereoscopic display technology and simulation technology. This paper starts with the product characteristics of VR, studies and summarizes the characteristics that should be possessed at all levels in the integration of VR technology and computer, including composition characteristics, experience characteristics, technical characteristics and application characteristics, etc. The technical characteristics of VR products, and the research on VR interactive input methods. This paper systematically summarizes the interactive input characteristics of VR technology and computer technology, and then combines the traditional user interface design theories and compares the differences and commonalities between VR interfaces and traditional interfaces, and proposes information display strategies with VR characteristics. Interface presentation strategy and visual design strategy. The final results of the study show that, comparing the scores of the experimental group and the control group, the scores of the experimental group are higher than those of the control group. Therefore, VR technology can help to improve teaching results in classroom teaching.","PeriodicalId":345703,"journal":{"name":"2022 International Symposium on Advances in Informatics, Electronics and Education (ISAIEE)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121549503","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Breast Cancer Classification Based on Various CNNs and Classifiers","authors":"Yuchen Ge, Kejia Liu, Longxin Wang, Qianyi Xue","doi":"10.1109/ISAIEE57420.2022.00011","DOIUrl":"https://doi.org/10.1109/ISAIEE57420.2022.00011","url":null,"abstract":"Breast cancer is the second leading cause of death from cancer in women around the world. The CAD system utilizing machine learning and deep learning techniques facilitates the early detection of breast cancers. However, few recent studies focused on utilizing multiple feature extractors to compare and analyze the performances of various architectures. This paper analyzes the performances of architectures which are combinations of different feature extractors and classifiers in breast cancer diagnosis. Firstly, we collected histopathological breast cancer images from the BreakHis dataset. Secondly, the normalized data were converted to one-hot encoding for training, validating, and testing. Thirdly, we used VGG-16, VGG-19, Xception, ResNet50, Inception-V3, and Inception-Resnet-V2 to extract features. Next, fully connected layer (FCL), logistic regression (LR), and SVM were employed to classify breast cancers on the BreaKHis dataset. The experimental result shows that with the cyclical learning rate (CLR) policy, the ResNet50-SVM model obtained the optimal accuracy rate of 93.9% on eight-classification. The result shows that our proposed method could diagnose breast cancer with high accuracy.","PeriodicalId":345703,"journal":{"name":"2022 International Symposium on Advances in Informatics, Electronics and Education (ISAIEE)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125403440","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Xinyu Liang, Yifan Hu, Haosen Wang, Yibing Wu, Jun Geng
{"title":"Substation Safety Control Robot System Based on 3D Virtual Simulation Technology","authors":"Xinyu Liang, Yifan Hu, Haosen Wang, Yibing Wu, Jun Geng","doi":"10.1109/ISAIEE57420.2022.00035","DOIUrl":"https://doi.org/10.1109/ISAIEE57420.2022.00035","url":null,"abstract":"In order to further promote the unmanned process of substation and build the intelligent safety control system with substation virtual simulation technology, a substation safety control robot system is designed. The system consists of two subsystems: Substation automatic inspection robot system and virtual reality substation simulation software. The former is a substation ground automatic inspection device that can be remotely controlled. The latter can be interconnected with the former to achieve real-time monitoring and data interaction in the inspection process.","PeriodicalId":345703,"journal":{"name":"2022 International Symposium on Advances in Informatics, Electronics and Education (ISAIEE)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129331954","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Generation of Western Piano Music Based on Deep Learning","authors":"Jiandong Tang, Lanqing Yin, Jinming Yu","doi":"10.1109/ISAIEE57420.2022.00113","DOIUrl":"https://doi.org/10.1109/ISAIEE57420.2022.00113","url":null,"abstract":"A large number of automatic composition models based on deep learning have been proposed in the field of artificial intelligence. This paper regards music as a series of sequences, and proposes an improved structure of transformer (RM- Transformer), which uses random mask module to replace the original mask module. Firstly, music features are extracted during data preprocessing, and then the processed data is input to RM Transformer for training. This model learns the music features contained in the data itself. Finally, music can be generated using the trained model and compared with other network models. Among them, the prediction accuracy and sequence similarity increased by 6.6% and 9.6% respectively, and the harmony and melody of music have been greatly improved. The network structure is more suitable for music generation.","PeriodicalId":345703,"journal":{"name":"2022 International Symposium on Advances in Informatics, Electronics and Education (ISAIEE)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129566461","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Repairing Triple Data Erasure with Extending Row Diagonal Parity","authors":"Xiaohe Liu","doi":"10.1109/ISAIEE57420.2022.00017","DOIUrl":"https://doi.org/10.1109/ISAIEE57420.2022.00017","url":null,"abstract":"With the advent of the Big Data era, the amount of data stored has increased exponentially in recent years. In such an era, data storage security has become a significant challenge. As the volume of data increases, many data erasures during storage are inevitable. There has been a lot of research into dual fault-tolerant error correction code methods. EVENODD codes, Row Diagonal Parity (RDP) codes, and Horizontal-Diagonal Parity (HDP) codes can implement dual fault-tolerant data distribution. These self-correction codes allow up to two parts of the source code to be erased and the erased parts to be recovered. However, in many cases, it is not enough to fix two figures. This paper focuses on Extending Row Diagonal Parity (E-RDP) to cope with three or more data erasures. This data structure can efficiently recover three erasures based on RDP, which inherits the advantages of RDP. This article will explain the encoding process of E-RDP in detail, show an intuitive decoding method, and discuss the performance of E-RDP at the end.","PeriodicalId":345703,"journal":{"name":"2022 International Symposium on Advances in Informatics, Electronics and Education (ISAIEE)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131460795","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Zhang Tao, Chunmei Ma, Huazhi Sun, Yan Liang, Bo Wang, Yige Fang
{"title":"Behavior recognition research based on reinforcement learning for dynamic key feature selection","authors":"Zhang Tao, Chunmei Ma, Huazhi Sun, Yan Liang, Bo Wang, Yige Fang","doi":"10.1109/ISAIEE57420.2022.00054","DOIUrl":"https://doi.org/10.1109/ISAIEE57420.2022.00054","url":null,"abstract":"In the task of behavior recognition based on time-series sequential data, there are often some features that are interference redundancies after feature extraction of the original data by the depth model, and these redundancies will not be beneficial to recognition but will have interference effects. Therefore, it is important to accurately select the features that are beneficial for recognition in behavior recognition tasks. To address the above issues, We propose a reinforcement learning framework, called Dynamic Key Feature Selection Network(DKFSN), aiming to achieve accuracy improvement by continuously exploring the advantages and disadvantages of distinguishing features, eliminating the redundant features that interfere with recognition, and retaining the features rich in quality information. First, feature extraction of the original data using a baseline network to capture depth features and prediction results. Using the depth features as input to a dynamic feature selection network to predict which features are retained and then making a determination to retain key features. Finally, behavior prediction by retained key features and feedback on the selection behavior using a reward function are used for the training of the DKFSN. We validated the validity of DKFSN on two public benchmark datasets.","PeriodicalId":345703,"journal":{"name":"2022 International Symposium on Advances in Informatics, Electronics and Education (ISAIEE)","volume":"6 5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122558810","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Method of Training Neural Networks to Extract Wind-formed Sand Ripples","authors":"Chang-Beom An, Xiao-hong Dang, Z. Meng","doi":"10.1109/ISAIEE57420.2022.00066","DOIUrl":"https://doi.org/10.1109/ISAIEE57420.2022.00066","url":null,"abstract":"Sand ripples are the smallest landforms in arid and semi-arid areas, and are extremely important for the study of wind-induced sand movement. They can be more conveniently measured using neural network digital image processing technology. This study extracted sand ripples using a combination of DenseNet and photos of aeolian sand ripples ridge lines. The study area was located at the junction between northwest Zhongwei and the southeastern edge of the Tengger Desert in the Ningxia Hui Autonomous Region. A convolutional neural network was trained using the ridge line image of aeolian sand ripples. After several iterations, a clear image was obtained. This paper provides a training model that can automatically monitor each frame in an image and provides a feasible scheme for the automatic monitoring of the formation of wind ripple ridges. The study has a certain reference value for the future construction of digital desert information.","PeriodicalId":345703,"journal":{"name":"2022 International Symposium on Advances in Informatics, Electronics and Education (ISAIEE)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116492180","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}