Yashi Wang, Zhiming Lei, Wenbo Lan, Xiaofeng Wang, Bin Tan, Cuimei Chen, Chang‐ming Nie
{"title":"Study on computer simulation prediction of the structure properties of heme-arsenic complexes","authors":"Yashi Wang, Zhiming Lei, Wenbo Lan, Xiaofeng Wang, Bin Tan, Cuimei Chen, Chang‐ming Nie","doi":"10.1109/ICSP54964.2022.9778792","DOIUrl":"https://doi.org/10.1109/ICSP54964.2022.9778792","url":null,"abstract":"We used the computer program Gaussian 16 B.01 for density functional theory calculations, replacing the central metal atom of heme with arsenic atom to obtain the optimized structure of the complex formed by the heme ligand and As. Under the same level of calculation, we analyzed and predicted the structural properties, infrared spectrum, UV-Vis absorption spectrum, binding energy and frontier molecular orbital levels of the synthetic complex, and compared these properties with heme to determine the differences. Studies have predicted that the binding capacity of the heme ligand to arsenic is weaker than that to iron, and the chemical stability of the complex formed by As is weaker than that formed by Fe.","PeriodicalId":363766,"journal":{"name":"2022 7th International Conference on Intelligent Computing and Signal Processing (ICSP)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122528408","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Qiaoming Guo, Huaxian Liang, Huanwang Liao, Longsheng Zhang, Dong Ni
{"title":"Statistical analysis and Research on energy consumption in highway service area","authors":"Qiaoming Guo, Huaxian Liang, Huanwang Liao, Longsheng Zhang, Dong Ni","doi":"10.1109/ICSP54964.2022.9778407","DOIUrl":"https://doi.org/10.1109/ICSP54964.2022.9778407","url":null,"abstract":"With the development of the construction technology and operation mode of the highway green sustainable development service area, attention should be paid to the composition and impact of the energy consumption of the highway service area. Drawing on the existing calculation method of energy consumption level, a method of energy consumption measurement suitable for expressway operation period is proposed. Through the analysis of the results of the example, the maximum energy consumption per unit area in the service area of Jiangxi Province is 3798.47 kgce / arc.y, and the average value is 2112 kgce / arc•y; about 25% of the service area’s electricity consumption accounts for the total energy. The proportion of consumption is greater than 70%. In the research and calculation of energy consumption in a typical service area, the proportion of total energy consumption in the electricity consumption service area is about 72%. It is finally concluded that the total energy consumption of the Lushan service area in 2019 is 172934.61 kg of standard coal, and energy consumption usually occurs in February and October. On the whole, the energy consumption in the service area is mainly concentrated in the electricity consumption of buildings, and the water consumption in restaurants and toilets. The regularity of the periodic energy load changes in the expressway service area should be considered, and the technical measures for energy conservation and consumption reduction should be implemented.","PeriodicalId":363766,"journal":{"name":"2022 7th International Conference on Intelligent Computing and Signal Processing (ICSP)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126180985","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Molecular dynamics simulation of the decomposition mechanism of C4F7N/CO2 mixed gas","authors":"Yongxing Wang, Feng Yuan, Ru Chen, Lifan Zhang, Xiyu Feng, Lizhi Wang, Enyuan Dong","doi":"10.1109/ICSP54964.2022.9778547","DOIUrl":"https://doi.org/10.1109/ICSP54964.2022.9778547","url":null,"abstract":"In this paper, the Reax FF-MD of C<inf>4</inf>F<inf>7</inf>N/CO<inf>2</inf> mixed gas reaction is carried out based on the Molecular Dynamics Theory. The decomposition process of C<inf>4</inf>F<inf>7</inf>N/CO<inf>2</inf> mixed gas at high temperature is simulated. The decomposition mechanism of C<inf>4</inf>F<inf>7</inf>N/CO<inf>2</inf> mixed gas is studied theoretically. The results show that the decomposition process of C<inf>4</inf>F<inf>7</inf>N can be divided into two process: The decomposition process of C<inf>4</inf>F<inf>7</inf>N molecules into free radicals such as C, F, CN, CF, CF<inf>2</inf>, CF<inf>3</inf> at high temperature, and the recombination between carbon atoms and free radicals with the temperature decrease. At the same time, the effect of reaction temperature on the decomposition process of C<inf>4</inf>F<inf>7</inf>N is studied by controlling the system temperature. The change of total energy during the decomposition of C<inf>4</inf>F<inf>7</inf>N is analyzed.","PeriodicalId":363766,"journal":{"name":"2022 7th International Conference on Intelligent Computing and Signal Processing (ICSP)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126382706","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Y. Li, Jian Zhang, Kun Wang, Feng Han, Xiaohua Feng, Haowei Zhang, X. Shao, Chunjiang Pang
{"title":"A Multi-Target Selection Method for Power Equipment Virtual Assembly System","authors":"Y. Li, Jian Zhang, Kun Wang, Feng Han, Xiaohua Feng, Haowei Zhang, X. Shao, Chunjiang Pang","doi":"10.1109/ICSP54964.2022.9778566","DOIUrl":"https://doi.org/10.1109/ICSP54964.2022.9778566","url":null,"abstract":"With the continuous development of virtual assembly technology, virtual assembly system has been widely used in military, medicine, agriculture, industrial production, manufacturing and other fields. In order to improve the operability of power equipment virtual assembly system, a highly applicable multi-target object selection method is essential. Because the power equipment has close assembly relationship, there is widespread occlusion between components. However, the existing object selection methods can’t solve the multi-target object selection problem in the case of complete occlusion. Therefore, this paper proposes a multi-target object selection method based on volume region. This method is divided into a fully inclusive selection method and a partially intersecting selection method. The spatial position and size range of the cuboid selection area of the two methods are adjusted by the oculus rift's touch handle. The fully inclusive selection method is to determine whether all eight vertices of the target’s cuboid bounding box are within the selection area. If so, the target is determined to be selected. The partially intersecting selection method is to determine whether there are one or more vertices of the eight vertices in the selection area. If so, the target is determined to be selected. The experimental results show that the proposed method has high applicability in the case of semi occlusion, full occlusion and multi-target, which greatly improves the training and teaching efficiency of power equipment virtual assembly system.","PeriodicalId":363766,"journal":{"name":"2022 7th International Conference on Intelligent Computing and Signal Processing (ICSP)","volume":"101 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129331353","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Remote Sensing Geological Classification of Sea Islands and Reefs Based on Deeplabv3 +","authors":"Zihao Zheng, Changbao Yang, Jianming Zhao, Yuze Feng","doi":"10.1109/ICSP54964.2022.9778709","DOIUrl":"https://doi.org/10.1109/ICSP54964.2022.9778709","url":null,"abstract":"China’s vast sea area, coral reefs are important marine resources, but also an important part of land resources. Remote sensing monitoring of coral reefs and studying their geological conditions and changes are of great significance to the development of coral reefs and environmental protection. In recent years, with the promotion of high-resolution remote sensing images, high-resolution remote sensing images are widely used in the classification of coral reefs. Aiming at the problems of fuzzy boundary and low classification accuracy in traditional methods for coral reef classification, a classification method based on Deeplabv3 + network model is proposed. Seven geological types of Ganquan Island in Xisha Islands are extracted and classified. The overall classification accuracy and Kappa coefficient are 97.57 % and 0.9643, respectively. Compared with traditional support vector machine (SVM) and object-oriented classification methods, the results show that: the geological classification of coral reefs from high-resolution satellite images based on Deeplabv3 + model can better extract its essential characteristics, and the classification effect is good, meeting the accuracy requirements.","PeriodicalId":363766,"journal":{"name":"2022 7th International Conference on Intelligent Computing and Signal Processing (ICSP)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129437108","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Model Checking for AlphaCode-Generated Programs","authors":"Weijun Zhu","doi":"10.1109/ICSP54964.2022.9778472","DOIUrl":"https://doi.org/10.1109/ICSP54964.2022.9778472","url":null,"abstract":"AlphaCode (AC) can generate C++ programs automatically. However, the properties of the programs need to be verified. It is an open challenge to complete the task automatically using the model checking technique. To deal with this issue, a novel approach is proposed in this study. First, a program generated by AlphaCode is modeled using a formal mechanism, such as automata or graphs. Second, a property that needs to be satisfied in states and paths of the program can be described by a logic formula, especially for a temporal logic one. On the basis of it, the model checking problem for AC-generated programs is transformed to a common model checking one. A case study on using of bounded model checker for AC-generated programs demonstrates the feasibility of the proposed method.","PeriodicalId":363766,"journal":{"name":"2022 7th International Conference on Intelligent Computing and Signal Processing (ICSP)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131286017","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"In-Vehicle Network Intrusion Detection System Based on Bi-LSTM","authors":"Defeng Ding, Lu Zhu, Jiaying Xie, Jiaying Lin","doi":"10.1109/ICSP54964.2022.9778620","DOIUrl":"https://doi.org/10.1109/ICSP54964.2022.9778620","url":null,"abstract":"In order to improve the accuracy of in-vehicle network anomaly detection by using the time correlation between CAN messages, this paper proposes an intrusion detection system based on Bi-directional Long Short-Term Memory (Bi-LSTM) network, and designed a sliding window strategy, Time series linear regression was performed on the real vehicle-mounted message data set to determine the sliding window of the optimal time length. The two-dimensional input data sample set is constructed according to the determined sliding window, and the two-dimensional data feature training classifier is learned by BILSTM network, and the trained network model is used to realize intrusion detection. In this experiment, four data sets were used to verify the detection performance. Compared with the existing research methods, the detection accuracy of the four data sets increased by 5.3%, 3.8%, 2% and 3.3% on average.","PeriodicalId":363766,"journal":{"name":"2022 7th International Conference on Intelligent Computing and Signal Processing (ICSP)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131364260","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"FWIB: Fuzzy Weighted Iterative Bayes Algorithm","authors":"Tianhan Wang, Weidong Zhang, Dayong Lin","doi":"10.1109/ICSP54964.2022.9778309","DOIUrl":"https://doi.org/10.1109/ICSP54964.2022.9778309","url":null,"abstract":"Within the theoretical framework of Naive Bayes(NB), Iterative Bayes(IB), as an important variant, was proposed to alleviate the attribute interdependence problem based on output adjustment technique and shows certain performance enhancement. However, like NB, IB also suffers from biased classification and poor robustness against noise on class imbalanced data. To address these problems, cost-sensitive learning is introduced, and by assigning fuzzy-membership values to training data, we propose a class of Fuzzy Weighted Iterative Bayes algorithms (FWIB-CE, FWIB-HE, FWIB-CL-HL) to integrate more prior information from the sample distribution. The experimental results on ten typical imbalanced datasets show our methods have significant outperformance over NB and IB under G-mean evaluation in classification and have higher robustness against noise interference.","PeriodicalId":363766,"journal":{"name":"2022 7th International Conference on Intelligent Computing and Signal Processing (ICSP)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130061126","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Equalization Techniques for Unmanned Aerial Vehicles Communication Based on Early Termination of Iteration","authors":"Zihao Pan, Ning Yang, D. Guo, Chen Xie","doi":"10.1109/ICSP54964.2022.9778667","DOIUrl":"https://doi.org/10.1109/ICSP54964.2022.9778667","url":null,"abstract":"This paper investigates the doubly iterative turbo equalization of signals with high-order modulation for unmanned aerial vehicle (UAV) communication network, where the communication channel can be seen as a frequency-selective fading. In practice, the optimal detection is intractable for high-order modulations. Linear Minimum Mean Square Error (LMMSE) scheme is considered to be an efficient and low-cost alternative. Based on the turbo LMMSE equalization, expectation propagation (EP) algorithm is utilized to improve the gain by doubly iterative structure, called Block-EP (BEP). Then, considering the increasing decoding delay, an improved BEP (IBEP) algorithm in the inner loops is developed based on early termination of iteration. Moreover, hard decision aided (HDA) stopping criterion is utilized in the outer iteration. The simulation results demonstrate that the combination of IBEP and HDA stopping criterion effectively reduces the average iteration number and improve the real-time performance of double iteration, comparing conventional scheme.","PeriodicalId":363766,"journal":{"name":"2022 7th International Conference on Intelligent Computing and Signal Processing (ICSP)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115954900","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design and Implementation of a Universal Offline Reading System for Embedded Device Firmware","authors":"Yancang Chen, Yerong Tao, Shuxin Zhai, Sai Sui","doi":"10.1109/ICSP54964.2022.9778558","DOIUrl":"https://doi.org/10.1109/ICSP54964.2022.9778558","url":null,"abstract":"Obtaining firmware is one of the prerequisites for vulnerability analysis, mining, and verification. Web crawlers can obtain a large number of firmware, but may not be able to obtain the firmware of a specific device under test. If the embedded device can be obtained, the online reading or offline reading method can be used to read the firmware from the firmware memory. This paper designed a firmware offline reading and writing system for embedded devices. The key modules such as logic design, system structure, host computer, and socket interfaces are introduced in detail. Tests have been done to prove the correctness and effectiveness of the system.","PeriodicalId":363766,"journal":{"name":"2022 7th International Conference on Intelligent Computing and Signal Processing (ICSP)","volume":"11 5","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120929311","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}