2022 IEEE 2nd International Conference on Computer Systems (ICCS)最新文献

筛选
英文 中文
Analysis of Local Rainfall Prediction Based on Intelligent Algorithm 基于智能算法的局地降雨预报分析
2022 IEEE 2nd International Conference on Computer Systems (ICCS) Pub Date : 2022-09-23 DOI: 10.1109/ICCS56273.2022.9987970
Sheng-bin Wu, Ying-di Yang, Qili Wu, Beibei Mao, Zhimin Liu, Hao Yu, Mei Long, Shao-Ting Ge
{"title":"Analysis of Local Rainfall Prediction Based on Intelligent Algorithm","authors":"Sheng-bin Wu, Ying-di Yang, Qili Wu, Beibei Mao, Zhimin Liu, Hao Yu, Mei Long, Shao-Ting Ge","doi":"10.1109/ICCS56273.2022.9987970","DOIUrl":"https://doi.org/10.1109/ICCS56273.2022.9987970","url":null,"abstract":"This paper discusses the model of Indian Ocean sea area, simulates the rainfall process and the related air sea interaction process in the bay of Bengal on the intraseasonal scale, explores the spatial distribution and temporal variation law of intraseasonal precipitation, and clarifies its related main dynamic factors, then uses the ConvLSTM which is the intelligent algorithm to provide a basis for the selection of seasonal precipitation prediction factors.","PeriodicalId":382726,"journal":{"name":"2022 IEEE 2nd International Conference on Computer Systems (ICCS)","volume":"11 7","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120937087","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Development of Language Feature Analysis System for Mineral Engineering English Corpus Based on Web 基于Web的矿产工程英语语料库语言特征分析系统开发
2022 IEEE 2nd International Conference on Computer Systems (ICCS) Pub Date : 2022-09-23 DOI: 10.1109/ICCS56273.2022.9988369
Aiqing Wang
{"title":"Development of Language Feature Analysis System for Mineral Engineering English Corpus Based on Web","authors":"Aiqing Wang","doi":"10.1109/ICCS56273.2022.9988369","DOIUrl":"https://doi.org/10.1109/ICCS56273.2022.9988369","url":null,"abstract":"Because the existing software has different versions of the research results, and the research methods have no continuity and coherence, it is convenient for professionals to conduct research on language characteristics by creating new functional processes. Using the technical characteristics of the database, compared with the existing analysis system, which only has the means of comparison between corpora and corpora, it has established a mineral science and technology English corpus. The system has added the function of uploading and comparing corpora, The system has added the function of corpus and uploaded corpus, as well as the comparative analysis between uploaded corpus and uploaded corpus, and expanded the application scope of the system. For a series of problems in the system design and implementation and problems that need to be improved and optimized, the system has also proposed problems that are not well solved in terms of function and technology, as well as preliminary solutions.","PeriodicalId":382726,"journal":{"name":"2022 IEEE 2nd International Conference on Computer Systems (ICCS)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117341233","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Method of Obtaining OD Matrix for Bus Passenger Flow Based on Pedestrian Re-identification Algorithm 基于行人再识别算法的公交客流OD矩阵获取方法
2022 IEEE 2nd International Conference on Computer Systems (ICCS) Pub Date : 2022-09-23 DOI: 10.1109/ICCS56273.2022.9987938
Xiaolei Liu, Li Guo, Weizhong Zhang, Wenshan Wang
{"title":"Method of Obtaining OD Matrix for Bus Passenger Flow Based on Pedestrian Re-identification Algorithm","authors":"Xiaolei Liu, Li Guo, Weizhong Zhang, Wenshan Wang","doi":"10.1109/ICCS56273.2022.9987938","DOIUrl":"https://doi.org/10.1109/ICCS56273.2022.9987938","url":null,"abstract":"In public transport, the OD (origin-destination) matrix of each passenger's starting and ending points is of great importance for bus scheduling and network optimization. The difficulty is matching passengers getting off at the back door with those getting on at the front door in real-time. The leading technology used here is re-identification. The current re-identification method is mainly used in the security field of pedestrian re-identification, vehicle filling discrimination, and although the accuracy is high, the real-time performance is poor. In this paper, the classical method FastReID is improved by changing its attention module using GCNet to improve accuracy and by adding a fully connected layer to the BNNeck structure to classify other essential attributes of pedestrians while calculating the distance between the same passenger attributes; in the loss function, constraints are applied according to the distance between this attributes to reduce the intra-class distance. Finally, passenger features are stored in categories by attributes to improve the final retrieval efficiency. Experiments show that the method in this paper improves accuracy by 3.2 % and detection speed by 14.73% (69.58ms) per 100 retrievals compared to FastReID.","PeriodicalId":382726,"journal":{"name":"2022 IEEE 2nd International Conference on Computer Systems (ICCS)","volume":"32 5","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131806041","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Subway Water Leakage Detection Based on Improved deeplabV3+ 基于改进deeplabV3+的地铁漏水检测
2022 IEEE 2nd International Conference on Computer Systems (ICCS) Pub Date : 2022-09-23 DOI: 10.1109/ICCS56273.2022.9988699
Mengjiao Li, Hao Wang, Shumei Zhang, Pengxiang Gao
{"title":"Subway Water Leakage Detection Based on Improved deeplabV3+","authors":"Mengjiao Li, Hao Wang, Shumei Zhang, Pengxiang Gao","doi":"10.1109/ICCS56273.2022.9988699","DOIUrl":"https://doi.org/10.1109/ICCS56273.2022.9988699","url":null,"abstract":"At present, water seepage problems in subway tunnels are not uncommon, and the detection and prevention of water seepage diseases have become a hot issue in subway projects. Due to the disadvantages of manual inspection, such as slow speed and safety uncertainty, this paper undertakes research into an improved method of detecting water seepage in subway tunnels with the DeeplabV3+ algorithm. The approach is to add the ECA-Net channel attention mechanism to both effective feature layers of the codec part of the DeeplabV3+ model that will be modelled with the Xception backbone network. The improved algorithm shows a significant improvement over the original algorithm for the detection of water leakage in subway tunnels, with mean Intersection over Union(mIOU) rising from 87.06% to 90.18%. The model enables accurate localisation of water leakage areas in subway tunnels, enabling speedy and highly accurate water leakage detection.","PeriodicalId":382726,"journal":{"name":"2022 IEEE 2nd International Conference on Computer Systems (ICCS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128944265","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
SLIC Research and Implementation of a Parallel Optimization Algorithm SLIC并行优化算法的研究与实现
2022 IEEE 2nd International Conference on Computer Systems (ICCS) Pub Date : 2022-09-23 DOI: 10.1109/ICCS56273.2022.9988402
Shang Xiaomin, Li Qiang, Qi Yongmeng, Tao Shunan
{"title":"SLIC Research and Implementation of a Parallel Optimization Algorithm","authors":"Shang Xiaomin, Li Qiang, Qi Yongmeng, Tao Shunan","doi":"10.1109/ICCS56273.2022.9988402","DOIUrl":"https://doi.org/10.1109/ICCS56273.2022.9988402","url":null,"abstract":"SLIC is an image segmentation method that clusters picture pixels into superpixel blocks. But it has many flaws, including large amount of computation and high data dependency. In this paper, the reference point of the main computation of the SLIC algorithm is moved from the cluster center to the ordinary pixel point by changing the structure of the algorithm. Although the computation time increased, the paralism of the algorithm improved, and the pixel dependency reduced too. At the same time, the traversal method is changed from a single pixel point to a cluster center when calculating the pixel sum of each cluster center. The parallel optimization method is a hybrid programming paradigm based on OpenMP and MPI. Compared with the standard SLIC method, in this parallel algorithm, the computation time largely reduced in the multi-core computer.","PeriodicalId":382726,"journal":{"name":"2022 IEEE 2nd International Conference on Computer Systems (ICCS)","volume":"580 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123175635","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Detection of Turn-to-Turn Short Circuit Fault of Permanent Magnet Synchronous Motor Based on Wavelet Packet Transform and KNN 基于小波包变换和KNN的永磁同步电机匝间短路故障检测
2022 IEEE 2nd International Conference on Computer Systems (ICCS) Pub Date : 2022-09-23 DOI: 10.1109/ICCS56273.2022.9987826
Huan Shuaiwei, L. Jinhua, Zhao Junli, Zhang Yujie, Wang Qi
{"title":"Detection of Turn-to-Turn Short Circuit Fault of Permanent Magnet Synchronous Motor Based on Wavelet Packet Transform and KNN","authors":"Huan Shuaiwei, L. Jinhua, Zhao Junli, Zhang Yujie, Wang Qi","doi":"10.1109/ICCS56273.2022.9987826","DOIUrl":"https://doi.org/10.1109/ICCS56273.2022.9987826","url":null,"abstract":"A fault feature extraction and fault diagnosis method based on wavelet packet transform and KNN classification algorithm is proposed for the problems of difficult diagnosis, hard detection, and inaccurate feature extraction in permanent magnet synchronous motor. The method decomposes the torque and current signals collected under the same fault level of a turn-to-turn short circuit by different wavelet bases and decomposition layers. The decomposed coefficients of each layer are used to calculate the energy value as the original features. A new feature extraction and optimization method (I_w method) is proposed to handle the energy-valued features of both signals. The KNN algorithm uses the extracted features to classify and diagnose turn-to-turn short circuit faults. Our experiments show that the accuracy of our method is 100% for turn-to-turn short circuit fault detection, which is improved compared with other methods, and the time consumption is shorter.","PeriodicalId":382726,"journal":{"name":"2022 IEEE 2nd International Conference on Computer Systems (ICCS)","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123447201","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Lightweight and Secure Data Sharing Scheme for Mobile Device in Cloud Computing 一种轻量级、安全的云计算移动设备数据共享方案
2022 IEEE 2nd International Conference on Computer Systems (ICCS) Pub Date : 2022-09-23 DOI: 10.1109/ICCS56273.2022.9987876
X. Wang, Xiuqing Lu, Quanli Lu, Ning Wei
{"title":"A Lightweight and Secure Data Sharing Scheme for Mobile Device in Cloud Computing","authors":"X. Wang, Xiuqing Lu, Quanli Lu, Ning Wei","doi":"10.1109/ICCS56273.2022.9987876","DOIUrl":"https://doi.org/10.1109/ICCS56273.2022.9987876","url":null,"abstract":"With the developing of cloud computing, an increasing number of businesses are apt to store the big data on cloud servers and share it effectively with users. Many massive data sharing solutions have been developed in many industries so far. However, there are still many problems in sharing sensitive big data in the cloud such as data security. Furthermore, big data sharing schemes on mobile terminal devices frequently entail a substantial processing cost. We propose an efficient and secure big data sharing scheme for mobile devices to address the current issues. Firstly, we use attribute-based encryption to achieve big data sharing. Secondly, we employ proxy server for encryption and decryption, thereby greatly decreasing computational overhead on mobile devices. Finally, the scheme gains high efficiency by reducing the use of complex bilinear pairs.","PeriodicalId":382726,"journal":{"name":"2022 IEEE 2nd International Conference on Computer Systems (ICCS)","volume":"143 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116376920","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Insulator Pollution Grade Recognition Method and Platform 绝缘子污染等级识别方法与平台
2022 IEEE 2nd International Conference on Computer Systems (ICCS) Pub Date : 2022-09-23 DOI: 10.1109/ICCS56273.2022.9987914
Qingdan Huang, Hongbing Wang, Jing Liu, Huihong Huang, Kaiqing Wei
{"title":"Insulator Pollution Grade Recognition Method and Platform","authors":"Qingdan Huang, Hongbing Wang, Jing Liu, Huihong Huang, Kaiqing Wei","doi":"10.1109/ICCS56273.2022.9987914","DOIUrl":"https://doi.org/10.1109/ICCS56273.2022.9987914","url":null,"abstract":"Insulators play an important role in the power grids. However, when they get polluted, the flashover phenomenon may take place, which will bring huge losses to the power grid companies. The flashover phenomenon is closely related to the pollution levels of insulators, which need being measured to guide the maintenance work of insulators. If there is a convenient and accurate method to detect the pollution levels of insulators, the work to prevent the flashover phenomenon will be more efficient. To this end, an automatic insulator pollution grade recognition method based on hyperspectral imaging technology and SVM (Support Vector Machine) is proposed. What's more, this paper implements a matching automatic recognition platform with friendly human-computer interaction interface by PLC (Programmable Logic Controller) and Qt. The procedures of the automatic recognition method, the hardware composition and the software work flow of the automatic recognition platform are presented successively. At last, the final integrated recognition platform and the accuracy of the recognition method are exhibited to show their effectiveness.","PeriodicalId":382726,"journal":{"name":"2022 IEEE 2nd International Conference on Computer Systems (ICCS)","volume":"249 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114552093","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Covert Communication Method Combining Secret Sharing and Steganography 一种结合秘密共享和隐写术的秘密通信方法
2022 IEEE 2nd International Conference on Computer Systems (ICCS) Pub Date : 2022-09-23 DOI: 10.1109/ICCS56273.2022.9988316
Peizheng Yan, Kaixi Wang, Xiaozhu Jia
{"title":"A Covert Communication Method Combining Secret Sharing and Steganography","authors":"Peizheng Yan, Kaixi Wang, Xiaozhu Jia","doi":"10.1109/ICCS56273.2022.9988316","DOIUrl":"https://doi.org/10.1109/ICCS56273.2022.9988316","url":null,"abstract":"In the distributed environment, when all parties carry out the cooperative computing, there are problems of low scalability and privacy leakage. To solve the above problems, this paper proposes a scheme that integrates the secret sharing and distributed steganography. Arnold transform is performed to encrypt the secret before the communication, and this transform can effectively improve the robustness of secret transmission. After a secret is embedded in a cover, the scheme uses random numbers to generate multiple sub-stego-objects, then carries out the distributed storage and communication for these sub-stego-objects. The identity of the sender is verified by the receiver using Schnorr zero-knowledge proof at the local, which reduced interaction between the sender and the receiver, and no more information is not obtained by the receiver except the stego-object. As a result, the receiver does not communicate directly with the sender, which, to some extent, can avoid the attention of the steganography from external attackers. Additionally, this scheme can still work even in the case that some users were disconnected from the system after a stego-object is transmitted. After analyzing how the scheme supports more senders, the correctness of the scheme is also proved in detail.","PeriodicalId":382726,"journal":{"name":"2022 IEEE 2nd International Conference on Computer Systems (ICCS)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132748453","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Mathematical Image Analysis of Light Fused with Computer Fuzzy Algorithm 融合计算机模糊算法的光图像数学分析
2022 IEEE 2nd International Conference on Computer Systems (ICCS) Pub Date : 2022-09-23 DOI: 10.1109/ICCS56273.2022.9987735
Jia-Ci Tang
{"title":"Mathematical Image Analysis of Light Fused with Computer Fuzzy Algorithm","authors":"Jia-Ci Tang","doi":"10.1109/ICCS56273.2022.9987735","DOIUrl":"https://doi.org/10.1109/ICCS56273.2022.9987735","url":null,"abstract":"The fuzzy mathematics theory was born in 1965, and it takes uncertain things as the research object. In recent years, the research on fuzzy mathematics theory has been deepened again and again. Therefore, the theoretical research of fuzzy mathematics is widely used in aerospace, petrochemical, nuclear power and many other industries. At the same time, under the impetus of advanced computer science and technology, fuzzy mathematics theory is the most important in the field of computer application. Digital image processing technology is to use the computer's recognition and operation functions to carry out image processing, and fuzzy mathematical theory is also used in the process of image processing. In order to improve the accuracy and precision of image processing, it is a problem to be solved urgently to enhance digital images by using fuzzy operations. Under this background, this paper uses the quadratic element function to process the data, and realizes the mathematical analysis of the image under the complex background. However, conventional digital images cannot be used effectively for mathematical computer modeling. In the application process of optical recognition technology, how to balance the visible light image under various constraints is the key issue of applying computer fuzzy method to light analysis. For images with complex backgrounds, this paper adopts the flow mathematics method of different adjacent regions to solve traditional flow problems under complex backgrounds. On this basis, the VNM (Von Neumann and Morgenstern) function is used to reduce the noise of the image in the complex background, and the computer blur algorithm is used to maximize the light intensity and spatial distribution of the digital image. Finally, pixel-level fusion of digital images is realized.","PeriodicalId":382726,"journal":{"name":"2022 IEEE 2nd International Conference on Computer Systems (ICCS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134158403","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信