Yejun Qu, Yafei Sun, Junyan Liu, Zengye Fu, Qian Sun
{"title":"Application of voice recognition control technology in wind power field operation","authors":"Yejun Qu, Yafei Sun, Junyan Liu, Zengye Fu, Qian Sun","doi":"10.1109/ICDSCA56264.2022.9987986","DOIUrl":"https://doi.org/10.1109/ICDSCA56264.2022.9987986","url":null,"abstract":"This paper designs a wind power equipment operation monitoring platform based on speech recognition, wind power equipment information collection module, information processing unit, central control room monitoring system, mobile monitoring system and remote terminal monitoring system. Compared with the current technical level, the interaction efficiency between the monitoring terminal and the wind turbine operation monitoring equipment solved by the new system is relatively weak, especially the interaction efficiency of the data obtained by the diagnostic personnel is relatively small. The reduction of interaction efficiency will eventually lead to the problem of the quality of wind power equipment operation guarantee.","PeriodicalId":416983,"journal":{"name":"2022 IEEE 2nd International Conference on Data Science and Computer Application (ICDSCA)","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129716564","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Computer intelligent quantitative transaction decision model based on GRU network","authors":"Yuyang He, Yuxin Yang, Deming Lei","doi":"10.1109/ICDSCA56264.2022.9987853","DOIUrl":"https://doi.org/10.1109/ICDSCA56264.2022.9987853","url":null,"abstract":"We build a model that gives the best daily trading strategy only based on the day's price data. Firstly, we use the RNN neural network model as the basic model. However, we find that there will be problems such as gradient disappearance or gradient explosion when training the network due to the cumulative rise of information. So we have made improvements to use the GRU (Gated Recurrent Unit) network, which can predict the next day's price. Then, we use the Apriori data mining algorithm to preprocess data and establish a Quantitative transaction decision model. However, the obtained solution is too complex, and we carry out nonlinear fitting into an exponential trading formula. The fitting effect is better than previous results.","PeriodicalId":416983,"journal":{"name":"2022 IEEE 2nd International Conference on Data Science and Computer Application (ICDSCA)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129755347","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Study on the Synergy between Real Estate and Digital Inclusive Finance Based on CRITIC Model and Big Data Analysis","authors":"Zhuoyi Chen, Xinyi Zhang, Yihong Ye","doi":"10.1109/ICDSCA56264.2022.9988496","DOIUrl":"https://doi.org/10.1109/ICDSCA56264.2022.9988496","url":null,"abstract":"As an important part of national economic development, the impact of the Real Estate Industry on economic growth has attracted more and more attention. Based on Criteria Importance Though Intercrieria Correlation (CRITIC) algorithm, this paper constructs the coordination degree model of regional real estate economy and inclusive finance, selects Guangdong Province as a region, collects the order parameter index data of regional real estate economy and regional digital inclusive finance system in Guangdong Province from 2011 to 2020, calculates the weight of order parameter index of regional real estate economy and regional digital inclusive finance system by using the CRITIC algorithm, and analyzes the order degree of subsystems and the compound degree of a collaborative system. The results show that the synergy degree of regional real estate economy and regional digital inclusive financial composite system in Guangdong Province from 2011 to 2020 presents an M-shaped development trend of alternation of increase and decrease, and is generally at a low level of synergy.","PeriodicalId":416983,"journal":{"name":"2022 IEEE 2nd International Conference on Data Science and Computer Application (ICDSCA)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128348327","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on Network Confrontation Information Security Protection System under Computer Deep Learning","authors":"Man Wang","doi":"10.1109/ICDSCA56264.2022.9988655","DOIUrl":"https://doi.org/10.1109/ICDSCA56264.2022.9988655","url":null,"abstract":"Aiming at the single hopping strategy in the terminal information hopping active defense technology, a variety of heterogeneous hopping modes are introduced into the terminal information hopping system, the definition of the terminal information is expanded, and the adaptive adjustment of the hopping strategy is given. A network adversarial training simulation system is researched and designed, and related subsystems are discussed from the perspective of key technologies and their implementation, including interactive adversarial training simulation system, adversarial training simulation support software system, adversarial training simulation evaluation system and adversarial training Mock Repository. The system can provide a good environment for network confrontation theory research and network confrontation training simulation, which is of great significance.","PeriodicalId":416983,"journal":{"name":"2022 IEEE 2nd International Conference on Data Science and Computer Application (ICDSCA)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129687346","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Two-Stage U-Net for Optic Disc/Cup Segmentation","authors":"Haibo Yu, Weihai Ying","doi":"10.1109/ICDSCA56264.2022.9987816","DOIUrl":"https://doi.org/10.1109/ICDSCA56264.2022.9987816","url":null,"abstract":"Optic disc/cup segmentation is the key step to calculate cup-to-disc ratio automatically which plays a substantial character in the clinical marker investigation of glaucoma early screening and intelligent diagnosis. However, conventional segmentation methods have disadvantages in determining the boundary of optic disc, identifying optic cup and vessel. This investigation proposes a novel two-stage U-Net to segment optic disc/cup gradually. Domain knowledge of fundus image and widely used morphological processing techniques are integrated in input and output block, which enable the model to improve the optic disc/cup's contrast and correct the unbalanced illumination among all images. Besides, he neural network introduced deep supervision block to facilitate the low-level layers to acquire further semantic knowledge. The proposed algorithm attains pixel-wise AUC of 99.70% and 96.83% for optic disc and cup segmentation separately, which achieves the state-of-the-art representation for these two assignments on the Drishti-GS1 dataset.","PeriodicalId":416983,"journal":{"name":"2022 IEEE 2nd International Conference on Data Science and Computer Application (ICDSCA)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129893821","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Computer-generated Humour Based on GPT-2","authors":"Yuchen Su","doi":"10.1109/ICDSCA56264.2022.9987901","DOIUrl":"https://doi.org/10.1109/ICDSCA56264.2022.9987901","url":null,"abstract":"Humour generation has always been a huge challenge in the area of computational humour. In this paper, we explore how to generate jokes based on keywords by fine-tuning GPT-2 pre-training model based on keywords task and comparing them with the LSTM-based encoder-decoder model. We trained the model by the short jokes of Conan O'Brien and the puns dataset of Yang et al. with the help of Pos-Tagger. Then, we evaluate the humour by using human evaluation and the similarity with keywords and jokes by using automatic evaluation. In terms of the final average score, the performance of our model is better than the LSTM-based encoder-decoder model.","PeriodicalId":416983,"journal":{"name":"2022 IEEE 2nd International Conference on Data Science and Computer Application (ICDSCA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130368245","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on D&A System Evaluation Model of Growth Based on BP Neural Network and Correlation Analysis","authors":"Binghui Ye, Shunan Liu","doi":"10.1109/ICDSCA56264.2022.9988509","DOIUrl":"https://doi.org/10.1109/ICDSCA56264.2022.9988509","url":null,"abstract":"As the leading development factor, enterprise management models can maximize the talents needed by the enterprise to promote long-term development effectively. How to effectively evaluate the D&A system is the challenge of many companies. To maximize the potential of the company's data assets, we applied the economic growth model to demonstrate further the close relationship between people, technology, and processes and the impact of economic factors on these three factors. We also used correlation analysis of parameters to establish an optimized evaluation model finally.","PeriodicalId":416983,"journal":{"name":"2022 IEEE 2nd International Conference on Data Science and Computer Application (ICDSCA)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129202860","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on Text Naming Recognition Algorithm Based on Text Mining","authors":"Yongxin Huang, Huang Tao","doi":"10.1109/ICDSCA56264.2022.9988337","DOIUrl":"https://doi.org/10.1109/ICDSCA56264.2022.9988337","url":null,"abstract":"In the process of scientific research, the naming of Chinese texts is very critical, which often affects scholars' cognition and judgment of things, and also has a certain impact on a series of operations such as experiments. On the other hand, in the process of professional research, many uncommon words often need to be verified by retrieving the corresponding knowledge system. The naming and recognition of these specialized words are very difficult, and there are many complex problems, such as polysemy and the nesting of wings. Therefore, under the above background conditions, this paper uses text mining method to conduct related research on the text naming of scientific research objects and uses the text mining method to construct and improve the text naming recognition algorithm accordingly. The support vector machine method and neural network model are used to build a text naming method suitable for Chinese, and good results are obtained in the application process.","PeriodicalId":416983,"journal":{"name":"2022 IEEE 2nd International Conference on Data Science and Computer Application (ICDSCA)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123965953","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on advertising strategy based on large-scale log data analysis","authors":"Lingli Zhao, Xiaoqin Yu","doi":"10.1109/ICDSCA56264.2022.9987858","DOIUrl":"https://doi.org/10.1109/ICDSCA56264.2022.9987858","url":null,"abstract":"The traditional advertising marketing methods and strategies are replaced, subverted, and updated under the influence of the Internet and big educational evidence, to bring more economic and more accurate marketing mode to advertising owners. This paper mainly expounds on the influence of big data on Internet advertising marketing mode and makes a brief analysis of Internet advertising's precise delivery strategy under big data.","PeriodicalId":416983,"journal":{"name":"2022 IEEE 2nd International Conference on Data Science and Computer Application (ICDSCA)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123342502","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on Performance Computer Evaluation Model of Low-Temperature Protective Clothing Based on Explicit Difference Method","authors":"Huihua Deng, Yiqing Sun","doi":"10.1109/ICDSCA56264.2022.9988061","DOIUrl":"https://doi.org/10.1109/ICDSCA56264.2022.9988061","url":null,"abstract":"At present, the research institute has developed a three-layer low-temperature protection composite material. Low-temperature protective materials are mainly used for short-term low-temperature protection, effectively reducing the harm of the external environment to the human body. In this paper, considering that the heat release capacity of the phase change layer is different at different temperatures, according to the data of heat release capacity and temperature of protective materials, the change of heat release capacity Q and field temperature T is fitted by Fourier function, and the functional relationship of material heat release is obtained. Therefore, the model is divided into three stages and calculated separately. In the first stage, there is no self-heating or internal heat source in the three-layer materials, so according to the law of conservation of energy and Fourier law, the unsteady heat conduction formula is deduced and solved. In the second stage, the phase change layer begins to release heat, and the first stage model is added to each layer's heat conduction control equation with heat release capability. The third stage is similar to the first stage. With the help of the explicit difference method, the model is discretized, and the cooling model of materials is solved to effectively evaluate the protective ability of low-temperature protective composites.","PeriodicalId":416983,"journal":{"name":"2022 IEEE 2nd International Conference on Data Science and Computer Application (ICDSCA)","volume":"509 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124467797","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}