Proceedings of the 7th International Conference on Cyber Security and Information Engineering最新文献

筛选
英文 中文
Application of Nuclear magnetic resonance Ultra-short-term load forecasting model based on digital twin 基于数字孪生的核磁共振超短期负荷预测模型的应用
Yingdong Huo
{"title":"Application of Nuclear magnetic resonance Ultra-short-term load forecasting model based on digital twin","authors":"Yingdong Huo","doi":"10.1145/3558819.3565178","DOIUrl":"https://doi.org/10.1145/3558819.3565178","url":null,"abstract":"With the increasing complexity of power system and the improvement of demand for power consumption quality, in order to further improve the accuracy of load forecasting, this paper proposes the ELMAN neural network and the modified model based on digital twin for ultra-short-term load forecasting. Firstly, the ELMAN neural network ultra-short-term load prediction model was built, and the neural network model was optimized by immune particle swarm optimization. Secondly, according to the information of digital twin platform, the most similar days are found and the load prediction results are revised. Finally, the power load of a city in China is taken as an example and verified in two scenarios: winter and summer. The results show that the model proposed in this paper can effectively improve the accuracy of load prediction.","PeriodicalId":373484,"journal":{"name":"Proceedings of the 7th International Conference on Cyber Security and Information Engineering","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130023101","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research and implementation of IP address management in medium and large-scale local area networks 大中型局域网中IP地址管理的研究与实现
Yao-Ting Huang, Jingqiu Zhang, He Sun, Min Xie, Qingyu Li
{"title":"Research and implementation of IP address management in medium and large-scale local area networks","authors":"Yao-Ting Huang, Jingqiu Zhang, He Sun, Min Xie, Qingyu Li","doi":"10.1145/3558819.3565078","DOIUrl":"https://doi.org/10.1145/3558819.3565078","url":null,"abstract":"In order to improve the management level of IP address in medium and large-scale local area networks, realize the dynamic and unified distribution of IP addresses of the user, simplify the terminal Internet parameter setting, and improve the security level of the information system, this project researches the deployment of DHCP server in medium and large-scale local area networks, supporting Web visual management, and realizing the functions of assigning fixed IP addresses to users in the network, and carrying out management and statistical analysis. Through the simulation analysis in VMware Workstation, the functions of the above network architecture are verified. This project can be popularized and applied in banking network system and other networks, which can effectively improve the management efficiency and strengthen the unified and centralized management of network addresses and related information.","PeriodicalId":373484,"journal":{"name":"Proceedings of the 7th International Conference on Cyber Security and Information Engineering","volume":"240 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114213024","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimal Strategy: A Comprehensive Model for Predicting Price Trend and Algorithm Optimization 最优策略:价格趋势综合预测模型及算法优化
Chenfeng Xie, Xiaoya Wu, Xue Bai
{"title":"Optimal Strategy: A Comprehensive Model for Predicting Price Trend and Algorithm Optimization","authors":"Chenfeng Xie, Xiaoya Wu, Xue Bai","doi":"10.1145/3558819.3565125","DOIUrl":"https://doi.org/10.1145/3558819.3565125","url":null,"abstract":"In this paper, we study the price changes of bitcoin and gold over time by building an LSTM-based price prediction model and a genetic algorithm-based yield optimization model. Specifically, we build a two-layer LSTM-based time series forecasting model. In order to study how to make decisions on capital allocation and profit maximization, a single-objective optimization model based on a genetic algorithm is established. Furthermore, to prove that our decision model is optimal, we use the error evaluation metrics MSE, MAE, and R2 to perform statistical analysis on the predicted asset value and the actual asset value, where R2 reaches 0.8857. Finally, we perform a sensitivity analysis on transaction commissions.","PeriodicalId":373484,"journal":{"name":"Proceedings of the 7th International Conference on Cyber Security and Information Engineering","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134390677","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Review of Image Intelligent Recognition Technology 图像智能识别技术综述
Bo Li
{"title":"Review of Image Intelligent Recognition Technology","authors":"Bo Li","doi":"10.1145/3558819.3565203","DOIUrl":"https://doi.org/10.1145/3558819.3565203","url":null,"abstract":"In summary, as the computer improved, people need it to solve more complex problems. Thus, computer scientist invented artificial neural network. At first, ANN is very simple and only have single hidden layer. After decades development, ANN become more powerful and smart. With more algorithms have been invented and more hidden layers, Convolutional Neural Network have become a widely used nowadays: it could use for image classification, such as writings and photos. It could also use in autonomous vehicles. CNN could help doctor to diagnose disease and increase device security by facial recognition. It could also use on weather forecasting. One important usage of CNN is license plate recognition. There are four steps in this recognition: plate localization, plate inclination correction, character segmentation and character recognition. First, computers need to find vehicle plate in the photos since they are taken in various conditions. This requires a series of preprocessing. After locating plate in the photos, the computer would calculate the angle of inclination of the plate and correct it. Next, the computer would locate characters on the plate and size of them, using such information to segment them. Last, CNN analyzes these characters and gives out results. A CNN is consisted by input layer, hidden layer and output layer. CNN would adjust the weights in each layer based on difference between the output and the answer. More adjustment would lead to more accurate result. Finally, CNN would identify characters on plates. In conclusion, CNN has a bright prospect of application, and it will make things more convenient.","PeriodicalId":373484,"journal":{"name":"Proceedings of the 7th International Conference on Cyber Security and Information Engineering","volume":"109 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133629344","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Correlation Analysis of Traffic Accident Factors based on Mean Clustering 基于均值聚类的交通事故因素相关性分析
Ziwen Niu, Yan-liang Wang, Shibao Sun
{"title":"Correlation Analysis of Traffic Accident Factors based on Mean Clustering","authors":"Ziwen Niu, Yan-liang Wang, Shibao Sun","doi":"10.1145/3558819.3565146","DOIUrl":"https://doi.org/10.1145/3558819.3565146","url":null,"abstract":"In order to effectively improve the mining efficiency of traffic accident factors and enhance the clarity of mining results, an association analysis method based on mean clustering is proposed. Firstly, the method generalizes the accident data, extracts the main accident attributes, and uses K-means clustering to classify the accident level according to the number of casualties; Based on different accident levels, the improved Apriori algorithm is used for association analysis to mine the main contributing factors. The experiment uses the British government public data set and multiple data mining algorithms for quantitative and qualitative analysis. The results show that the mining efficiency of the combined algorithm has been significantly improved, and the correlation results can more intuitively reflect the relationship between accident factors and accident severity, which is suitable for traffic accident profile analysis.","PeriodicalId":373484,"journal":{"name":"Proceedings of the 7th International Conference on Cyber Security and Information Engineering","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133932003","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Attention mechanism foreign fiber image recognition algorithm 注意机制国外纤维图像识别算法
Hengli Zuo
{"title":"Attention mechanism foreign fiber image recognition algorithm","authors":"Hengli Zuo","doi":"10.1145/3558819.3565128","DOIUrl":"https://doi.org/10.1145/3558819.3565128","url":null,"abstract":"In order to solve the problem of poor detection effect of heterotropy fiber in cotton like cotton, a method of heterotropy fiber detection based on improved YOLOv5 was proposed. The CBAM module of attention mechanism was introduced to build the improved CBAM-YOLOV5 model. The real cotton fiber image data set was divided into training set and test set according to the ratio of 4:1, and six image augmentation methods such as translation and rotation were used to expand the data set. The YOLOv5 model before and after improvement was compared. The experimental results show that the improved YOLOv5 model can better identify the cotton-like fibers and improve the recognition accuracy by 7.68%.","PeriodicalId":373484,"journal":{"name":"Proceedings of the 7th International Conference on Cyber Security and Information Engineering","volume":"92 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133985247","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Monopulse Angle Measurement Algorithm for One-Dimensional Distributed Coherent Array 一维分布式相干阵列单脉冲角度测量算法
Xueqi Wang, L. Xiao, C. Shi, Zhiqiang Guan, Shaopeng Wu
{"title":"Monopulse Angle Measurement Algorithm for One-Dimensional Distributed Coherent Array","authors":"Xueqi Wang, L. Xiao, C. Shi, Zhiqiang Guan, Shaopeng Wu","doi":"10.1145/3558819.3558833","DOIUrl":"https://doi.org/10.1145/3558819.3558833","url":null,"abstract":"A single pulse angle measurement Algorithm for distributed coherent array is proposed to deal with the ambiguity of angle measurement caused by the phenomenon of sparsely distributed grating lobes in distributed coherent arrays. The method is based on a one-dimensional distributed array model, and the rough estimation results and ambiguous Precise estimation results are obtained by the single pulse angle measurement algorithm for single array and distributed arrays. Solving the Ambiguity of the Precise estimation results with the rough estimation results to obtain high-precision angle measurement results without ambiguity. The simulation results show that the method can achieve correct Ambiguity Resolution and high-precision angle measurement while meeting the signal-to-noise ratio requirements, and the angle measurement accuracy also increases with the increase of the number of subarrays.","PeriodicalId":373484,"journal":{"name":"Proceedings of the 7th International Conference on Cyber Security and Information Engineering","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134267719","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on the Application of Computer Data Analysis Technology in the Image Processing of Ocean Survey 计算机数据分析技术在海洋调查图像处理中的应用研究
Qiyong Gong, Lei Zhao, Lei Chen, Congyong Bi, Xin Zhao
{"title":"Research on the Application of Computer Data Analysis Technology in the Image Processing of Ocean Survey","authors":"Qiyong Gong, Lei Zhao, Lei Chen, Congyong Bi, Xin Zhao","doi":"10.1145/3558819.3565204","DOIUrl":"https://doi.org/10.1145/3558819.3565204","url":null,"abstract":"De-noising, enhancing, and edge extraction of ocean engineering images can improve the utilization of information. After bilateral filtering pre-processed the image, a multi-scale spatial representation is introduced, and finally an approximate sparse model iterative learning strategy is used to group and detect the candidate corner points set to select the corner points at the smallest scale as the best corner points. Experimental results show that the improved algorithm improves the corner detection rate and reduces the number of redundant corner points, which is better than the multi-scale Harris algorithm and Harris-Laplace algorithm.","PeriodicalId":373484,"journal":{"name":"Proceedings of the 7th International Conference on Cyber Security and Information Engineering","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134271715","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Deep Learning Techniques in Financial Fraud Detection 金融欺诈检测中的深度学习技术
Kuangyi Gu
{"title":"Deep Learning Techniques in Financial Fraud Detection","authors":"Kuangyi Gu","doi":"10.1145/3558819.3565093","DOIUrl":"https://doi.org/10.1145/3558819.3565093","url":null,"abstract":"Nowadays, the rapid development of information technology brings great convenience to people and the financial industry. However, hidden fraud risks emerge at the same time. We can find increasing financial fraud easily. A typical example is credit card fraud, and it will cause the loss of billions of dollars for financial companies and institutions every year. In the process of solving these new types of financial frauds, some traditional statistical and machine learning methods don't perform well. As a result, lots of experts devote themselves to designing some new machine learning methods, and they do have found some great new methods. This paper gives a comprehensive review of new statistics and machine learning methods in detecting financial fraud. The review summarizes and introduces the core idea of these new methods. It provides a good reference source in guiding the detection of financial fraud for both academic and practical fields with useful information on the statistic and machine learning fields.","PeriodicalId":373484,"journal":{"name":"Proceedings of the 7th International Conference on Cyber Security and Information Engineering","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125465091","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A dual-channel SSD pedestrian detection algorithm based on feature fusion 一种基于特征融合的双通道SSD行人检测算法
Jiangkun Lu, Hongyang Chen
{"title":"A dual-channel SSD pedestrian detection algorithm based on feature fusion","authors":"Jiangkun Lu, Hongyang Chen","doi":"10.1145/3558819.3565142","DOIUrl":"https://doi.org/10.1145/3558819.3565142","url":null,"abstract":"In order to solve the phenomenon of false detection and missed detection in the pedestrian counting algorithm caused by the change of occlusion and illumination in crowded scenes, this paper proposes a dual-channel SSD pedestrian detection algorithm based on feature fusion, which improves pedestrian detection under illumination and occlusion conditions. In the dual-channel SSD network structure, the Conv4_3 and FC7 layers in the color image channel are fused with the Conv4_3 and FC7 layers in the depth image channel in Concat or Eltwise ways to obtain the optimal dual-channel SSD network model. Then, the Conv4_3_Fuse layer in the network is fused with the Conv10_2_Fuse and Conv11_2_Fuse layers to fully learn the feature information of pedestrian heads. The experimental results show that the improved algorithm is tested on the TVHeads data set, and the detection accuracy obtained is 95.4%, which is 13.16% higher than that of the SSD algorithm, which improves the problem of missed detection caused by illumination changes and occlusion, and enhances the detection of pedestrians head recognition.","PeriodicalId":373484,"journal":{"name":"Proceedings of the 7th International Conference on Cyber Security and Information Engineering","volume":"116 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127307069","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信