{"title":"Research on Calculation Method of Annular Leakage Rate based on Variable Conservation Method","authors":"Peng Chen","doi":"10.54097/fcis.v5i3.14033","DOIUrl":"https://doi.org/10.54097/fcis.v5i3.14033","url":null,"abstract":"The annular leakage rate is the most important parameter to measure the failure of gas well barrier units. At present, there are two methods that can be applied to calculate the leakage rate of offshore gas wells: safety valve method and nozzle flow method. However, applying these two methods to the calculation of annular leakage rate has encountered a problem of poor adaptability. In order to enhance the accuracy of leakage rate calculation results and improve the reliability of judging gas well integrity through annular leakage rate, this article summarizes an annular rate calculation method based on variable conservation method.","PeriodicalId":346823,"journal":{"name":"Frontiers in Computing and Intelligent Systems","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139288897","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"SafeCross: Helping Elder People Cross the Road Timely Using Thermal Imaging and Image Recognition","authors":"Leyan Yang","doi":"10.54097/fcis.v5i3.14047","DOIUrl":"https://doi.org/10.54097/fcis.v5i3.14047","url":null,"abstract":"Some older adults face challenges of cross the road in time due to reduced mobility and declining sensory abilities. Existing technologies have limitations in accurately identifying pedestrians. We propose SafeCross, a novel system that combines image recognition and thermal imaging technology based on the FLIR TrafiOne 156 sensor, which accurately detects elderly individuals at road intersections in low visibility or obstructed conditions and implement traffic light control based on the algorithm provided by SafeCross. Our findings demonstrate the potential of SafeCross system ensures safety for older adults at intersections, Making a significant contribution to reducing the accident rate among the elderly.","PeriodicalId":346823,"journal":{"name":"Frontiers in Computing and Intelligent Systems","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139289080","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on LAN Networking Solution for Small and Medium-sized Enterprises Using Huawei Communication Equipment","authors":"Jiahao Li, Qiongle Zuo, Zening Bai, Wenliang Wang, Xinrui Zhang, Nan Ding","doi":"10.54097/fcis.v5i3.14034","DOIUrl":"https://doi.org/10.54097/fcis.v5i3.14034","url":null,"abstract":"Against the background of imported communication equipment occupying the main market in China, this paper takes the network requirements of small and medium-sized enterprises as the research object and explores the feasibility of a LAN networking scheme based on Huawei's communication equipment, aiming to improve the network performance, security, reliability, and economy of small and medium-sized enterprises. This paper first introduces the basic concepts and characteristics of LANs, as well as the network requirements and characteristics of small and medium-sized enterprises; then it introduces the main products and functions of Huawei's communication equipment, as well as its advantages and applicability in LAN networking solutions; then it elaborates on the design principles, steps, and examples of the small and medium-sized enterprise LAN networking solution based on Huawei's communication equipment; and finally, through experimental tests and data analysis, it Finally, through experimental tests and data analysis, the performance, security, reliability, and economy of the small and medium-sized enterprise LAN networking scheme based on Huawei's communication equipment are evaluated and compared, and some meaningful conclusions and recommendations are drawn.","PeriodicalId":346823,"journal":{"name":"Frontiers in Computing and Intelligent Systems","volume":"41 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139288835","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Volleyball Action Recognition based on Skeleton Data","authors":"Zhanhao Liang, Batyrkanov Jenish Isakunovich","doi":"10.54097/fcis.v5i3.14038","DOIUrl":"https://doi.org/10.54097/fcis.v5i3.14038","url":null,"abstract":"This research explores the intricacies of volleyball action recognition using skeleton data through the lens of the Long Short-Term Memory (LSTM) model. With the objective of accurately identifying distinct volleyball actions—Serve, Spike, Block, Dig, and Set—the study implemented a structured LSTM network, achieving a commendable 95% accuracy rate consistently across all actions. The findings underscore the transformative potential of deep learning, particularly the LSTM network, in sports analytics, suggesting a paradigm shift in understanding and analyzing sports actions. The research serves as a foundation for future studies, offering insights into the blend of artificial intelligence in sports, with applications extending to coaching support and enhanced sports broadcasts.","PeriodicalId":346823,"journal":{"name":"Frontiers in Computing and Intelligent Systems","volume":"101 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139289201","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Overview of Hyperspectral Image Classification by Data-driven Deep Learning","authors":"Xiaochuan Yu, Mary B. Ozdemir, M. K. Joshie","doi":"10.54097/fcis.v5i3.13999","DOIUrl":"https://doi.org/10.54097/fcis.v5i3.13999","url":null,"abstract":"Hyperspectral imaging (HSI) in remote sensing is gaining significant attention due to its complexity, posing challenges for conventional machine learning in achieving accurate classification. The inherent nonlinear relationship between captured spectral information and materials further complicates hyperspectral imaging. Deep learning has emerged as an effective tool for feature extraction, finding widespread applications in image processing tasks. Motivated by its success, this survey integrates deep learning into hyperspectral imaging (HSI) classification, demonstrating commendable performance. The paper systematically reviews existing literature, providing a comparative analysis of strategies. Primary challenges in HSI classification for traditional methods are outlined, emphasizing the advantages of deep learning. Our framework categorizes works into three types: spectral-feature networks, spatial-feature networks, and spectral-spatial-feature networks, offering a comprehensive review of recent achievements and diverse approaches. Considering limited training samples in remote sensing and substantial data requirements for deep networks, strategies to enhance classification performance are presented, offering valuable insights for future studies. Experiments apply representative deep learning-based classification methods to real HSIs, providing practical validation. The survey contributes to understanding the current landscape in deep learning-based HSI classification and lays a foundation for future research in this evolving field.","PeriodicalId":346823,"journal":{"name":"Frontiers in Computing and Intelligent Systems","volume":"24 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139288974","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Review of Target Detection Algorithms","authors":"Xu Zhou, Guojun Lin","doi":"10.54097/fcis.v4i3.10736","DOIUrl":"https://doi.org/10.54097/fcis.v4i3.10736","url":null,"abstract":"Object detection is a popular direction of computer vision and digital image processing, which is widely used in robot navigation, intelligent video surveillance, industrial detection, aerospace and other fields, using computer vision to reduce human capital consumption has important practical significance. Because of the wide application of deep learning, the algorithm of target detection has been developed rapidly. This paper mainly introduces the traditional target detection algorithm and two kinds of target detection algorithm based on depth learning and the data set commonly used in target detection.","PeriodicalId":346823,"journal":{"name":"Frontiers in Computing and Intelligent Systems","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132734080","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Real-time Classifier of Multilingual Font Styles based on ResNet, SwordNet, Logistic Regression and Random Forest Algorithms","authors":"Yue Wu","doi":"10.54097/fcis.v4i3.10735","DOIUrl":"https://doi.org/10.54097/fcis.v4i3.10735","url":null,"abstract":"Different languages have different characters. At the same time, each character has a lot of font styles. This makes it difficult for humans to recognize different font styles for different characters. However, being able to detect and identify these font styles quickly and accurately has many important application use cases in different fields. At the same time, a large number of Internet users use web pages to query font styles. Therefore, I choose to make this real-time multilingual font style recognition algorithm. In this paper, I propose an algorithm that recognizes the input text and pictures in real time to judge the language and style of the text. It includes ResNet, SwordNet, logistic regression and random forest algorithms. The whole algorithm also calls pytesseract and Google Tesseract to realize text recognition and text positioning. I used Font Datasets used in \"Font and Calligraphy Style Recognition Using Complex Wavelet Transform\" for training. At the same time, I also built an image text recognition algorithm and generated various font styles as a data source. Based on this data, we adjusted the parameters and finally achieved an accuracy rate higher than 90%.","PeriodicalId":346823,"journal":{"name":"Frontiers in Computing and Intelligent Systems","volume":"92 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132654865","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yuyan Huo, Baoyuan Kang, Xinyu Zuo, Shufang Niu, Anqian Li
{"title":"Analysis and Improvement of Authentication Schemes for Industrial Wireless Sensor Networks with Fog Computing","authors":"Yuyan Huo, Baoyuan Kang, Xinyu Zuo, Shufang Niu, Anqian Li","doi":"10.54097/fcis.v4i3.10737","DOIUrl":"https://doi.org/10.54097/fcis.v4i3.10737","url":null,"abstract":"Cloud computing enables access to needed resources from a shared pool of configurable computing resources anytime, anywhere. Cloud computing offers many benefits, such as security and reliability of data and convenience of resource sharing. But as more and more devices are accessed, the demand for network bandwidth increases and it is because cloud computing centralizes all the resources that risks are also centralized. To overcome the shortcomings of cloud computing, the concept of fog computing has been introduced. Fog computing supports high mobility and has a wide geographical distribution, it also delivers data with very low latency. However, as an extension of cloud computing, fog computing inherits the security and privacy issues of cloud computing. Therefore, identity authentication in a fog computing environment is essential. In 2022, Sahoo et al. proposed an authentication scheme for industrial wireless sensor networks with fog computing. However, we analyze the security of Sahoo et al.’s scheme and find that many places in the data distribution phase are not clearly explained and their scheme is also not resistant to user impersonation attack, tracking attack, denial of service attack and replay attack. In order to overcome the weaknesses of Sahoo et al.’s scheme, this paper proposes an improved scheme by making full use of random numbers and timestamps. After security analysis and comparison with some similar schemes, it is shown that the improved scheme can resist various known attacks and has smaller computational cost.","PeriodicalId":346823,"journal":{"name":"Frontiers in Computing and Intelligent Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114026821","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Exploration on the Construction of County Medical Community Information Platform","authors":"Luyao Zhang, Lecai Cai","doi":"10.54097/fcis.v4i3.10733","DOIUrl":"https://doi.org/10.54097/fcis.v4i3.10733","url":null,"abstract":"By combing the development status and key problems of the county medical community model, analyzing the practical scenarios of the county medical community, combining Big data, cloud computing, artificial intelligence related technologies, designing the architecture model of the county medical community information platform, and exploring the construction methods of the county medical community information platform that meet the social development status and meet the people's health needs. It provides reference for the landing and development of future medical informatization, medical Big data platform and county medical community information platform.","PeriodicalId":346823,"journal":{"name":"Frontiers in Computing and Intelligent Systems","volume":"371 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116540023","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design and Implementation of a Learning Resource Recommendation System based on User Habits Based on GNN","authors":"Jingxuan Lu, YangKwon Jeong, Jiaqi Xue","doi":"10.54097/fcis.v4i3.11135","DOIUrl":"https://doi.org/10.54097/fcis.v4i3.11135","url":null,"abstract":"This project aims to design and implement a learning resource recommendation system based on Graph Neural Networks (GNN). The system utilizes user learning habits as a foundation to provide personalized learning resource recommendations. By collecting and preprocessing user learning history data, and constructing a user-resource relationship graph, the GNN model is used to learn the representation vectors of users and resources. Combined with user habit features, appropriate recommendation algorithms are employed to recommend learning resources that align with their interests and habits.","PeriodicalId":346823,"journal":{"name":"Frontiers in Computing and Intelligent Systems","volume":"11 8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130163928","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}