Frontiers in Computing and Intelligent Systems最新文献

筛选
英文 中文
Research on Calculation Method of Annular Leakage Rate based on Variable Conservation Method 基于变量守恒法的环形泄漏率计算方法研究
Frontiers in Computing and Intelligent Systems Pub Date : 2023-11-05 DOI: 10.54097/fcis.v5i3.14033
Peng Chen
{"title":"Research on Calculation Method of Annular Leakage Rate based on Variable Conservation Method","authors":"Peng Chen","doi":"10.54097/fcis.v5i3.14033","DOIUrl":"https://doi.org/10.54097/fcis.v5i3.14033","url":null,"abstract":"The annular leakage rate is the most important parameter to measure the failure of gas well barrier units. At present, there are two methods that can be applied to calculate the leakage rate of offshore gas wells: safety valve method and nozzle flow method. However, applying these two methods to the calculation of annular leakage rate has encountered a problem of poor adaptability. In order to enhance the accuracy of leakage rate calculation results and improve the reliability of judging gas well integrity through annular leakage rate, this article summarizes an annular rate calculation method based on variable conservation method.","PeriodicalId":346823,"journal":{"name":"Frontiers in Computing and Intelligent Systems","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139288897","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SafeCross: Helping Elder People Cross the Road Timely Using Thermal Imaging and Image Recognition 安全过马路:利用热成像和图像识别技术帮助老年人及时过马路
Frontiers in Computing and Intelligent Systems Pub Date : 2023-11-05 DOI: 10.54097/fcis.v5i3.14047
Leyan Yang
{"title":"SafeCross: Helping Elder People Cross the Road Timely Using Thermal Imaging and Image Recognition","authors":"Leyan Yang","doi":"10.54097/fcis.v5i3.14047","DOIUrl":"https://doi.org/10.54097/fcis.v5i3.14047","url":null,"abstract":"Some older adults face challenges of cross the road in time due to reduced mobility and declining sensory abilities. Existing technologies have limitations in accurately identifying pedestrians. We propose SafeCross, a novel system that combines image recognition and thermal imaging technology based on the FLIR TrafiOne 156 sensor, which accurately detects elderly individuals at road intersections in low visibility or obstructed conditions and implement traffic light control based on the algorithm provided by SafeCross. Our findings demonstrate the potential of SafeCross system ensures safety for older adults at intersections, Making a significant contribution to reducing the accident rate among the elderly.","PeriodicalId":346823,"journal":{"name":"Frontiers in Computing and Intelligent Systems","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139289080","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on LAN Networking Solution for Small and Medium-sized Enterprises Using Huawei Communication Equipment 使用华为通信设备的中小企业局域网联网解决方案研究
Frontiers in Computing and Intelligent Systems Pub Date : 2023-11-05 DOI: 10.54097/fcis.v5i3.14034
Jiahao Li, Qiongle Zuo, Zening Bai, Wenliang Wang, Xinrui Zhang, Nan Ding
{"title":"Research on LAN Networking Solution for Small and Medium-sized Enterprises Using Huawei Communication Equipment","authors":"Jiahao Li, Qiongle Zuo, Zening Bai, Wenliang Wang, Xinrui Zhang, Nan Ding","doi":"10.54097/fcis.v5i3.14034","DOIUrl":"https://doi.org/10.54097/fcis.v5i3.14034","url":null,"abstract":"Against the background of imported communication equipment occupying the main market in China, this paper takes the network requirements of small and medium-sized enterprises as the research object and explores the feasibility of a LAN networking scheme based on Huawei's communication equipment, aiming to improve the network performance, security, reliability, and economy of small and medium-sized enterprises. This paper first introduces the basic concepts and characteristics of LANs, as well as the network requirements and characteristics of small and medium-sized enterprises; then it introduces the main products and functions of Huawei's communication equipment, as well as its advantages and applicability in LAN networking solutions; then it elaborates on the design principles, steps, and examples of the small and medium-sized enterprise LAN networking solution based on Huawei's communication equipment; and finally, through experimental tests and data analysis, it Finally, through experimental tests and data analysis, the performance, security, reliability, and economy of the small and medium-sized enterprise LAN networking scheme based on Huawei's communication equipment are evaluated and compared, and some meaningful conclusions and recommendations are drawn.","PeriodicalId":346823,"journal":{"name":"Frontiers in Computing and Intelligent Systems","volume":"41 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139288835","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Volleyball Action Recognition based on Skeleton Data 基于骨架数据的排球动作识别
Frontiers in Computing and Intelligent Systems Pub Date : 2023-11-05 DOI: 10.54097/fcis.v5i3.14038
Zhanhao Liang, Batyrkanov Jenish Isakunovich
{"title":"Volleyball Action Recognition based on Skeleton Data","authors":"Zhanhao Liang, Batyrkanov Jenish Isakunovich","doi":"10.54097/fcis.v5i3.14038","DOIUrl":"https://doi.org/10.54097/fcis.v5i3.14038","url":null,"abstract":"This research explores the intricacies of volleyball action recognition using skeleton data through the lens of the Long Short-Term Memory (LSTM) model. With the objective of accurately identifying distinct volleyball actions—Serve, Spike, Block, Dig, and Set—the study implemented a structured LSTM network, achieving a commendable 95% accuracy rate consistently across all actions. The findings underscore the transformative potential of deep learning, particularly the LSTM network, in sports analytics, suggesting a paradigm shift in understanding and analyzing sports actions. The research serves as a foundation for future studies, offering insights into the blend of artificial intelligence in sports, with applications extending to coaching support and enhanced sports broadcasts.","PeriodicalId":346823,"journal":{"name":"Frontiers in Computing and Intelligent Systems","volume":"101 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139289201","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Overview of Hyperspectral Image Classification by Data-driven Deep Learning 数据驱动深度学习的高光谱图像分类概述
Frontiers in Computing and Intelligent Systems Pub Date : 2023-11-05 DOI: 10.54097/fcis.v5i3.13999
Xiaochuan Yu, Mary B. Ozdemir, M. K. Joshie
{"title":"An Overview of Hyperspectral Image Classification by Data-driven Deep Learning","authors":"Xiaochuan Yu, Mary B. Ozdemir, M. K. Joshie","doi":"10.54097/fcis.v5i3.13999","DOIUrl":"https://doi.org/10.54097/fcis.v5i3.13999","url":null,"abstract":"Hyperspectral imaging (HSI) in remote sensing is gaining significant attention due to its complexity, posing challenges for conventional machine learning in achieving accurate classification. The inherent nonlinear relationship between captured spectral information and materials further complicates hyperspectral imaging. Deep learning has emerged as an effective tool for feature extraction, finding widespread applications in image processing tasks. Motivated by its success, this survey integrates deep learning into hyperspectral imaging (HSI) classification, demonstrating commendable performance. The paper systematically reviews existing literature, providing a comparative analysis of strategies. Primary challenges in HSI classification for traditional methods are outlined, emphasizing the advantages of deep learning. Our framework categorizes works into three types: spectral-feature networks, spatial-feature networks, and spectral-spatial-feature networks, offering a comprehensive review of recent achievements and diverse approaches. Considering limited training samples in remote sensing and substantial data requirements for deep networks, strategies to enhance classification performance are presented, offering valuable insights for future studies. Experiments apply representative deep learning-based classification methods to real HSIs, providing practical validation. The survey contributes to understanding the current landscape in deep learning-based HSI classification and lays a foundation for future research in this evolving field.","PeriodicalId":346823,"journal":{"name":"Frontiers in Computing and Intelligent Systems","volume":"24 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139288974","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Review of Target Detection Algorithms 目标检测算法综述
Frontiers in Computing and Intelligent Systems Pub Date : 2023-07-31 DOI: 10.54097/fcis.v4i3.10736
Xu Zhou, Guojun Lin
{"title":"Review of Target Detection Algorithms","authors":"Xu Zhou, Guojun Lin","doi":"10.54097/fcis.v4i3.10736","DOIUrl":"https://doi.org/10.54097/fcis.v4i3.10736","url":null,"abstract":"Object detection is a popular direction of computer vision and digital image processing, which is widely used in robot navigation, intelligent video surveillance, industrial detection, aerospace and other fields, using computer vision to reduce human capital consumption has important practical significance. Because of the wide application of deep learning, the algorithm of target detection has been developed rapidly. This paper mainly introduces the traditional target detection algorithm and two kinds of target detection algorithm based on depth learning and the data set commonly used in target detection.","PeriodicalId":346823,"journal":{"name":"Frontiers in Computing and Intelligent Systems","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132734080","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Real-time Classifier of Multilingual Font Styles based on ResNet, SwordNet, Logistic Regression and Random Forest Algorithms 基于ResNet、SwordNet、Logistic回归和随机森林算法的多语言字体样式实时分类器
Frontiers in Computing and Intelligent Systems Pub Date : 2023-07-31 DOI: 10.54097/fcis.v4i3.10735
Yue Wu
{"title":"Real-time Classifier of Multilingual Font Styles based on ResNet, SwordNet, Logistic Regression and Random Forest Algorithms","authors":"Yue Wu","doi":"10.54097/fcis.v4i3.10735","DOIUrl":"https://doi.org/10.54097/fcis.v4i3.10735","url":null,"abstract":"Different languages have different characters. At the same time, each character has a lot of font styles. This makes it difficult for humans to recognize different font styles for different characters. However, being able to detect and identify these font styles quickly and accurately has many important application use cases in different fields. At the same time, a large number of Internet users use web pages to query font styles. Therefore, I choose to make this real-time multilingual font style recognition algorithm. In this paper, I propose an algorithm that recognizes the input text and pictures in real time to judge the language and style of the text. It includes ResNet, SwordNet, logistic regression and random forest algorithms. The whole algorithm also calls pytesseract and Google Tesseract to realize text recognition and text positioning. I used Font Datasets used in \"Font and Calligraphy Style Recognition Using Complex Wavelet Transform\" for training. At the same time, I also built an image text recognition algorithm and generated various font styles as a data source. Based on this data, we adjusted the parameters and finally achieved an accuracy rate higher than 90%.","PeriodicalId":346823,"journal":{"name":"Frontiers in Computing and Intelligent Systems","volume":"92 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132654865","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analysis and Improvement of Authentication Schemes for Industrial Wireless Sensor Networks with Fog Computing 基于雾计算的工业无线传感器网络认证方案分析与改进
Frontiers in Computing and Intelligent Systems Pub Date : 2023-07-31 DOI: 10.54097/fcis.v4i3.10737
Yuyan Huo, Baoyuan Kang, Xinyu Zuo, Shufang Niu, Anqian Li
{"title":"Analysis and Improvement of Authentication Schemes for Industrial Wireless Sensor Networks with Fog Computing","authors":"Yuyan Huo, Baoyuan Kang, Xinyu Zuo, Shufang Niu, Anqian Li","doi":"10.54097/fcis.v4i3.10737","DOIUrl":"https://doi.org/10.54097/fcis.v4i3.10737","url":null,"abstract":"Cloud computing enables access to needed resources from a shared pool of configurable computing resources anytime, anywhere. Cloud computing offers many benefits, such as security and reliability of data and convenience of resource sharing. But as more and more devices are accessed, the demand for network bandwidth increases and it is because cloud computing centralizes all the resources that risks are also centralized. To overcome the shortcomings of cloud computing, the concept of fog computing has been introduced. Fog computing supports high mobility and has a wide geographical distribution, it also delivers data with very low latency. However, as an extension of cloud computing, fog computing inherits the security and privacy issues of cloud computing. Therefore, identity authentication in a fog computing environment is essential. In 2022, Sahoo et al. proposed an authentication scheme for industrial wireless sensor networks with fog computing. However, we analyze the security of Sahoo et al.’s scheme and find that many places in the data distribution phase are not clearly explained and their scheme is also not resistant to user impersonation attack, tracking attack, denial of service attack and replay attack. In order to overcome the weaknesses of Sahoo et al.’s scheme, this paper proposes an improved scheme by making full use of random numbers and timestamps. After security analysis and comparison with some similar schemes, it is shown that the improved scheme can resist various known attacks and has smaller computational cost.","PeriodicalId":346823,"journal":{"name":"Frontiers in Computing and Intelligent Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114026821","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Exploration on the Construction of County Medical Community Information Platform 县级医疗社区信息平台建设的探索
Frontiers in Computing and Intelligent Systems Pub Date : 2023-07-31 DOI: 10.54097/fcis.v4i3.10733
Luyao Zhang, Lecai Cai
{"title":"Exploration on the Construction of County Medical Community Information Platform","authors":"Luyao Zhang, Lecai Cai","doi":"10.54097/fcis.v4i3.10733","DOIUrl":"https://doi.org/10.54097/fcis.v4i3.10733","url":null,"abstract":"By combing the development status and key problems of the county medical community model, analyzing the practical scenarios of the county medical community, combining Big data, cloud computing, artificial intelligence related technologies, designing the architecture model of the county medical community information platform, and exploring the construction methods of the county medical community information platform that meet the social development status and meet the people's health needs. It provides reference for the landing and development of future medical informatization, medical Big data platform and county medical community information platform.","PeriodicalId":346823,"journal":{"name":"Frontiers in Computing and Intelligent Systems","volume":"371 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116540023","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design and Implementation of a Learning Resource Recommendation System based on User Habits Based on GNN 基于GNN的用户习惯学习资源推荐系统的设计与实现
Frontiers in Computing and Intelligent Systems Pub Date : 2023-07-20 DOI: 10.54097/fcis.v4i3.11135
Jingxuan Lu, YangKwon Jeong, Jiaqi Xue
{"title":"Design and Implementation of a Learning Resource Recommendation System based on User Habits Based on GNN","authors":"Jingxuan Lu, YangKwon Jeong, Jiaqi Xue","doi":"10.54097/fcis.v4i3.11135","DOIUrl":"https://doi.org/10.54097/fcis.v4i3.11135","url":null,"abstract":"This project aims to design and implement a learning resource recommendation system based on Graph Neural Networks (GNN). The system utilizes user learning habits as a foundation to provide personalized learning resource recommendations. By collecting and preprocessing user learning history data, and constructing a user-resource relationship graph, the GNN model is used to learn the representation vectors of users and resources. Combined with user habit features, appropriate recommendation algorithms are employed to recommend learning resources that align with their interests and habits.","PeriodicalId":346823,"journal":{"name":"Frontiers in Computing and Intelligent Systems","volume":"11 8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130163928","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信