6,472 results
Search Results
2. Study on Detection Method of Foxing on Paper Artifacts Based on Hyperspectral Imaging Technology
- Author
-
Huan Tang, Dai Ruochen, Hang Liu, Bin Tang, and Mingfu Zhao
- Subjects
History ,Computer science ,business.industry ,Foxing ,Hyperspectral imaging ,Computer vision ,Artificial intelligence ,business ,Computer Science Applications ,Education - Abstract
Paper artifacts are contaminated by external factors in the process of preservation such as foxing. For the problem of backward technology of rapid detection of foxing on paper artifacts, a method based on hyperspectral imaging technology is proposed to detect foxing spots on paper artifacts. After selecting the region of interest and obtaining the corresponding average reflectance, the difference in the average reflectance is found after comparing the healthy regions with the diseased regions. Using band operation and minimum noise fraction to observe the characteristics of foxing image, although there is overlap in different parts, the distribution distinction between moldy and healthy regions is obvious; K-nearest neighbor method and BP neural network are applied to establish the spectral discrimination model of paper artifacts with foxing spots, and the overall discrimination rate of the two methods is 73.3% and 85%, respectively. The results show that hyperspectral imaging can be used for the identification of foxing spots, but the distinction between different parts is not good, and the discrimination effect still needs to be improved.
- Published
- 2021
3. A Review Paper on Fog Computing Paradigm to solve Problems and Challenges during Integration of Cloud with IoT
- Author
-
Rajesh Kumar Dhanaraj and Saurabh
- Subjects
History ,business.industry ,Fog computing ,Computer science ,Distributed computing ,Cloud computing ,Internet of Things ,business ,Computer Science Applications ,Education - Abstract
In Today’s world technologies such as Internet of Things, Cloud Computing as well as Fog Computing are growing at an exponential rate which depend upon each other directly or indirectly. The Internet of Things can be described as a network of substantial matter such as cars, washing machines, refrigerator which can interact with each other through internet. Billions of devices will be IoT enabled in near future and generate enormous amount of data but IoT devices has some limitations like storage capabilities, processing capabilities and utilization of resources which can only be handled by integrating it with cloud technology. Cloud model provide environment in which software, Infrastructure, sharable pool of configurable resources, virtual environment, sensors, hardware and database is provided as a utility for IoT devices and users. In cloud computing paradigm some limitations exist for example distance of the data source from multi-hop, geological unified structure, latency, heterogeneity and many more. To address such limitations, Fog computing approach can be used to bring computing assets nearer to IoT devices. Fog computing is an enhancement of the cloud-based Network and computing services. It provides computational and storage services of cloud proximate to IoT devices. This paper provides an overview regarding the cloud computing uses in IoT devices and issues or problems that occur during integration. Handling of problems that occurs during integration of cloud with IoT can be done through fog computing. The purpose of this survey is to understand the concept of fog computing to improve the existing system of Integration of Cloud with IoT.
- Published
- 2021
4. Review Paper on Development of Mobile Wireless Technology
- Author
-
Pardeep Kumar and Sumit
- Subjects
History ,Development (topology) ,Mobile wireless ,business.industry ,Computer science ,Mobile telephony ,Telecommunications ,business ,5G ,Computer Science Applications ,Education - Abstract
Wireless technology these days is very quickly becoming crescent. A network that was recently wired to get online was required. Just wired phones have been a thing of the past. In the past four decades, mobile networks have thrived immensely. The starting point was the 1G cellular concept where ‘G’ stances for generation linkages. This had fully developed very rapidly, generating 1G, 2G, 3G and gradually transferring into 4G from generation to generation. And now people are utilizing the 4G networks. 5G network will nearly stretch its wings to conquer this complex world of cell technology. Integrated 5G work is continuing, with complete service planned in 2020. The development of 5G technology is the perfect solution for the many problems facing us today with today’s innovations. 5G will become an intelligent technology that will limit to a single global uniform body the number of different innovations. This paper is mostly about the evolution of mobile wireless networks like 1G and 5G as well as how they vary and their benefits and drawbacks.
- Published
- 2021
5. Automatic Scoring System for Handwritten Examination Papers Based on YOLO Algorithm
- Author
-
Ruijie Ji, Mingliang Lu, and Weili Zhou
- Subjects
History ,Scoring system ,Computer science ,business.industry ,Pattern recognition ,Artificial intelligence ,business ,Computer Science Applications ,Education - Published
- 2021
6. Practice of the VOF Open Foam techniques aimed to parameters prediction of the « dampening solution - paper» interaction for the printing systems
- Author
-
L G Varepo, Yu M Sultanova, I V Chernaya, E Yu Orlova, O V Trapeznikova, and A A Rovenskikh
- Subjects
History ,Discretization ,Computer science ,business.industry ,Process (computing) ,Mechanical engineering ,Computational fluid dynamics ,Grid ,Computer Science Applications ,Education ,Visualization ,Volume of fluid method ,Ultrasonic sensor ,Hexahedron ,business - Abstract
The results of CFD research using the VOF method with Open Foam open source are presented. In the process of study, we built a digital model allowing us to analyze and predict the process of interaction of the dampening solution with substrate (paper) surface in the measuring cell of the PDA ultrasonic device. Discretization of the area for calculation was created using the blockMesh utility. A block-structural hexahedral computational grid has been constructed. The computational grid area is presented in such a way that the number of cells increases in the direction of the paper sample. The visualization of calculations in the ParaView package coincides with the time intervals obtained on the PDA ultrasonic measuring device. The practical significance of the study lies in the realization of the possibility to evaluate the dampening solution parameters, to control the modes of its supply, taking into account the use of modern papers and printing systems.
- Published
- 2021
7. Research on Intelligent Test Paper Generating System Based on Improved Genetic Algorithm
- Author
-
Qilong Yin
- Subjects
History ,education.field_of_study ,Fitness function ,Computer science ,business.industry ,Population ,Machine learning ,computer.software_genre ,Field (computer science) ,Computer Science Applications ,Education ,Test (assessment) ,Important research ,Genetic algorithm ,Line (geometry) ,Artificial intelligence ,education ,business ,computer - Abstract
Intelligent test paper generation belongs to an important research topic in the field of computer-aided education. Among them, Genetic Algorithm (GA), as an algorithm with high efficiency and performance, is widely used in the intelligent test paper generating system. But generally speaking, traditional GA always has some problems, such as local optimal solution and prematurity. The traditional genetic algorithm is improved in the aspects of the initial population, fitness function and some genetic operators to make it more in line with the requirements of intelligent paper generation, improving the efficiency and success ratio.
- Published
- 2021
8. A Survey Paper on Image Mining Techniques and Classification Brain Tumor
- Author
-
Azmi Tawfek Hussein Alrawi, Murtadha M. Hamad, and Dhamea A. Jasm
- Subjects
History ,business.industry ,Computer science ,ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION ,Brain tumor ,medicine ,Pattern recognition ,Artificial intelligence ,business ,medicine.disease ,Computer Science Applications ,Education ,Image (mathematics) - Abstract
Image mining is a method of searching and discovering the valuable information and knowledge from a set of huge image data. Image mining essentially depends on the data mining, digital image processing, machine learning, image retrieval, and artificial intelligence. Image mining is a process which is conducted to extract the hidden information such as image data and the additional pattern that could not be observed from the image. The main problems could face the mining of the collected images can be summarized in two main points: first is the image must be suitable for the mining process and second is the image’s chosen objects and features in order to be treated to extract the most effective route to save the time, and to save the effort. This paper is a survey presents the steps of the image mining process and represented an intensive view on using the image mining to the classify the brain tumors. In addition, it’s proposed a general scheme to accomplish the processes and to analysis the latest techniques which have been used to classify the brain tumors with comparison to the training groups and the amount of accuracy that obtained from the analysis. In addition, the paper compares the relevant and most recent published literature. The high published accuracy claim to be 98% which was obtained using the Deep convolutional neural network (DCNN).
- Published
- 2021
9. Research on Computer Test Paper Generation Algorithm Based on Gene Expression Programming
- Author
-
Yang Wenyan
- Subjects
History ,Computer science ,business.industry ,Artificial intelligence ,Gene expression programming ,business ,Computer Science Applications ,Education ,Test (assessment) - Abstract
This article analyzes the common classifications of computer test paper algorithms. This article includes random method, backtracking method, genetic algorithm, random location search method, ant colony algorithm, gene expression algorithm, etc. The author obtains the expected calculated values by studying the technologies of setting control parameters, creating initial populations, calculating individual fitness, optimizing preservation strategies, performing genetic operations, and generating new populations. The author’s purpose is to improve the application effect of the computer test paper algorithm and the practicability of the information in the question bank.
- Published
- 2020
10. Examination Paper Image Segmentation with Adversarial Network
- Author
-
Siquan Hu, Zhiguo Shi, Muliang Zhang, and Min Zhang
- Subjects
History ,Adversarial network ,business.industry ,Computer science ,Computer vision ,Artificial intelligence ,Image segmentation ,business ,Computer Science Applications ,Education - Abstract
Examination paper analysis is important for students to improve their learning efficiency. Traditional paper examination papers are difficult to sort out, which makes collecting mistakes for future review both time-consuming and laborious, either by handwriting or existed software tools. To easy the process, we propose a layout analysis method combined with the conditional generative adversarial network (CGAN). The traditional semantic segmentation structure is improved and used as a generator in the network, while a discriminator is designed to make the segmentation results more accurate. The motivation is that the discriminator can judge the authenticity of the image, so it can help reduce the unreasonable phenomenon in the semantic segmentation results of the generator. The experimental results show that by this method the examination paper image can be welly split into various components, which provides convenience for further sorting and analysis of the examination paper images.
- Published
- 2020
11. Automatic sentence extraction for the detection of scientific paper relations
- Author
-
M. Miftachudin, Sri Suryani Prasetiyowati, and Yuliant Sibaroni
- Subjects
History ,business.industry ,Sentence extraction ,Computer science ,Artificial intelligence ,business ,computer.software_genre ,computer ,Natural language processing ,Computer Science Applications ,Education - Published
- 2018
12. Rhetorical Sentence Categorization for Scientific Paper Using Word2Vec Semantic Representation
- Author
-
Masayu Leylia Khodra, Ghoziyah Haitan Rachman, and Dwi H. Widyantoro
- Subjects
060201 languages & linguistics ,History ,Information retrieval ,business.industry ,Computer science ,05 social sciences ,050109 social psychology ,06 humanities and the arts ,computer.software_genre ,Computer Science Applications ,Education ,Semantic role labeling ,Categorization ,Semantic similarity ,Resampling ,0602 languages and literature ,Rhetorical question ,0501 psychology and cognitive sciences ,Word2vec ,Artificial intelligence ,business ,Representation (mathematics) ,computer ,Natural language processing ,Sentence - Abstract
One of some ways to summarize scientific papers is by employing rhetorical structure of sentences. Determining rhetorical sentence itself passes through the process of text categorization. In order to get good performance, some works in text categorization have been done by employing semantic similarity words. Therefore, this paper aims to present the rhetorical sentence categorization from scientific paper by using selected features, added previous label, and Word2Vec to capture semantic similarity words. Then, this paper shows the result of employing resampling for balancing the existing instances per class and combining resampling and Word2Vec representation itself. Every experiment is tested in two classifiers, namely IBk and J48 tree. It shows that the use of previous label, Word2Vec (Skip-Gram), and resampling improves performance. After doing all the experiments in the 10-fold cross-validation, the highest performance of F-measure is achieved 84.97% by combining Word2Vec (Skip-Gram), all features, and resampling.
- Published
- 2017
13. ATLAS Analysis Papers and Conference Notes
- Author
-
Maidantchik, C, Pommes, K, Frias, L, Moraes, L, Galvão, K, Grael, F, Evora, L, and Ramos, B
- Subjects
Information management ,History ,Atlas (topology) ,business.industry ,Computer science ,Process (engineering) ,Library science ,Computer Science Applications ,Education ,World Wide Web ,Software ,Data retrieval ,Editorial team ,Detectors and Experimental Techniques ,business ,Publication process - Abstract
In 2010, the LHC experiment produced 7 TeV and heavy-ions collisions continually, generating a huge amount of data, which was analyzed and reported throughout several performed studies. Since then, physicists are bringing out papers and conference notes announcing results and achievements. During 2010, 37 papers and 102 conference notes were published and until September 2011 there are already 131 papers and 189 conference notes in preparation. This paper presents the ATLAS Analysis Papers and ATLAS Analysis Conference Notes systems, developed to monitor the entire publication procedure up to the final submission and to promote the communication among the collaboration members. The software supports the paper elaboration process, tracking the analysis results status and improvement of the paper initial version, presenting a step-by-step procedure overview and promoting communication among collaborators. Along with the increasing flow of papers and conference notes, one of the issues is the way to guarantee that all members who participate in the analysis studies are aware of not only the discussion deadlines but also of the publication process, which involves 17 steps, split in 3 different phases for papers and 10 steps in 1 phase for conference notes. By sending notifications based on predefined rules the systems inform members to approve each step and provide further information such as the approval conditions and the documents in which the publication is based on. Through the software it is also possible to manage dates and members of the editorial team. The data processing is performed by using the Glance System, the main data retrieval platform used for ATLAS information management.
- Published
- 2012
14. Automation technologies for fish processing and production of fish products
- Author
-
Y. A. Kozub, V. I. Komlatsky, V. V. Verkhoturov, and T. A. Podoinitsyna
- Subjects
History ,business.industry ,Computer science ,Production (economics) ,business ,Fish products ,Pulp and paper industry ,Fish processing ,Automation ,GeneralLiterature_MISCELLANEOUS ,Computer Science Applications ,Education - Abstract
The fish processing industry applies a small number of automation technologies compared to other industries. Their number should be increased despite automated food processing problems and hygiene requirements. Automation and implementation of robots can reduce production costs and improve product quality. The issues of designing automation systems for the fishing industry are analyzed. Automatic control systems can control quality of fish and fish products. Automated systems receive, freeze, sort, cut, wash, salt, dry, smoke, press, cool, package and store fish and fish products. Modern technological tools are equipped with automatic control systems. Some of them include specialized automation and robotic units equipped with microprocessor control systems. Application and implementation of automation systems for processing fish are described. Future trends are discussed.
- Published
- 2019
15. Review of spectral lighting simulation tools for non-image- forming effects of light
- Author
-
J van Duijnhoven, Mariëlle P.J. Aarts, and M Gkaintatzi-Masouti
- Subjects
History ,business.industry ,Computer science ,Computer vision ,Artificial intelligence ,business ,Computer Science Applications ,Education ,Image (mathematics) - Abstract
Light via our eyes influences visual performance, visual comfort and visual experience, but also affects several health related, non-image-forming (NIF) responses. New metrics have been developed to quantify the NIF effects of light. In order to incorporate these in lighting design practice, simulation tools are required that are able to process information about the spectral distribution of light sources and materials. However, most of the tools currently used for daylight and electric light simulations simplify the spectrum into RGB (Red, Green, Blue) colour values. This paper presents an overview of the currently used programs for simulating the NIF effects of light in building design and discusses the possibility of using existing spectral rendering software as an alternative. A review of literature shows that mostly Radiance or Radiance-based programs have been used so far, but new user-friendly tools could employ existing spectral rendering tools. As the NIF effects of light gain greater importance in lighting design, new simulation workflows are needed. This paper aims to support the development of future workflows by presenting the current state-of-the-art.
- Published
- 2021
16. RETRACTED: Research on Urban Electric Vehicle Public Charging Network Based on 5G and Big Data
- Author
-
Weijing Yao, Ke Wangsong, Zhang Cheng, Dai Zhang, Deng Guoru, and Lei Li
- Subjects
History ,business.product_category ,Hardware_GENERAL ,business.industry ,Computer science ,Electric vehicle ,Big data ,business ,5G ,Automotive engineering ,Computer Science Applications ,Education - Abstract
Under the pressure of energy and environmental protection, we will promote the technological progress and demonstration of electric vehicles, and the construction of charging facilities will continue. Charging facilities planning and orderly charging, as two major research directions of electric vehicle infrastructure, are of great significance for the future development of electric vehicles. The optimal charging of electric vehicles can effectively improve the safe and economic operation ability of distribution network, which is of great significance to its safe operation. Therefore, this paper proposes the outsourcing test experiment and processing of urban electric vehicle public charging network based on 5G and big data. In this paper, through the analysis of the development status of urban electric vehicles, this paper proposes to optimize the charging mode of electric vehicles by combining the charging network forward and backward algorithm. In the outsourcing test experiment, the electrical safety test shows that when the current reaches 1.1-37.1kw: 5000A, when the power factor is 0.8 ∼ 0.9, when the short-circuit current impact is tolerated, the connection device will not affect the breaking operation by contact fusion welding, and the insulation protection will not be invalid. Through investigation and analysis, the satisfaction degree of electric vehicle optimization algorithm is increasing year by year. Through the analysis of the test results, the research in this paper has achieved ideal results and made a contribution to the research of urban electric vehicle public charging network.
- Published
- 2021
17. Electromechanical Transient Modeling and LVRT Parameter Identification of Large Capacity Full Power Converter Wind Turbines Based on PSASP Program
- Author
-
Gan Jiatian, Xufeng Zhao, Lu Guoqiang, Tao Xiangyu, and Chen Chunmeng
- Subjects
History ,Identification (information) ,Wind power ,business.industry ,Computer science ,Large capacity ,Transient (oscillation) ,business ,Automotive engineering ,Computer Science Applications ,Education ,Power (physics) - Abstract
Full power converter wind turbine is the main type of wind power, so the simulation calculation needs to establish accurate model parameters. This paper analyzes the model structure of PSASP program according to its low voltage ride through control and physical characteristics, and puts forward the parameter identification method of LVRT characteristics of full power converter wind turbine, and to use the LVRT data of 5. 5MW unit for parameter identification and simulation verification. This paper proposes that the electromechanical transient simulation can ignore the part of the generator model of the full power converter wind turbine, and simulates the grid side converter with the controlled current source. The main characteristics of LVRT are determined by the control system of the converter. In order to do the parameter identification, it is necessary to calculate and analyze the control characteristics of multiple measured data. First, determine the control mode, then determine the control parameters to complete the parameter identification. In this paper, the modeling conditions and model structure of the full power converter wind turbine are confirmed. The correlation between the parameters during the LVRT fault and the parameters during the LVRT recovery period and the LVRT characteristics is analyzed. In this paper, a parameter identification method is proposed to analyze the active current and reactive current during the LVRT fault, which has strong physical significance and operability. Based on the actual LVRT characteristics of 5. 5MW wind turbine, the parameter identification and simulation are carried out to verify the correctness of the method.
- Published
- 2021
18. Hybrid UNet Architecture based on Residual Learning of Fundus Images for Retinal Vessel Segmentation
- Author
-
Sushma Nagdeote and Sapna Prabhu
- Subjects
Retinal vessel ,History ,business.industry ,Computer science ,Segmentation ,Computer vision ,Artificial intelligence ,Fundus (eye) ,business ,Residual ,eye diseases ,Computer Science Applications ,Education - Abstract
This paper deals with the new segmentation techniques for retinal blood vessels on fundus images. This technique aims at extracting thin vessels to reduce the intensity difference between thick and thin vessels. This paper proposes the modified UNet model by incorporating ResNet blocks into it which includes structured prediction. In this work we generate the visualization of blood vessels from retinal fundus image for two loss functions namely cross entropy loss and Dice loss where the network classifies several pixels simultaneously. The results shows higher accuracy by considering a much more expressive UNet algorithm and outperforms the past algorithms for Retinal Vessel Segmentation. The benefits of this approach will be demonstrated empirically.
- Published
- 2021
19. Internet of Things and Intelligent Transportation System
- Author
-
Dandan Zhang and Panjing Tan
- Subjects
World Wide Web ,History ,business.industry ,Computer science ,Internet of Things ,business ,Intelligent transportation system ,Computer Science Applications ,Education - Abstract
As the core of the new monitoring system, the Internet of Things realizes the integration of wireless sensor networks and traditional communication networks, and provides a platform for remote management and monitoring of the underlying equipment. The intelligent transportation system framework built on this basis combines intelligent transportation technology and the organic combination of vehicle management technologies is conducive to the safety, speed and reliability of vehicle transportation, and plays an important role in further reducing transportation costs. Based on this, this article launched the research on the Internet of Things and intelligent transportation systems. This article first summarizes the concepts of the Internet of Things, intelligent transportation and wireless sensor network technology and the current research status at home and abroad. By analyzing and comparing the performance and characteristics of various communication methods, embedded core microprocessors and embedded operating systems, this paper proposes an overall design scheme of the Internet of Things transportation system based on embedded technology. This paper analyzes the path planning problems in the application of the transportation system, combining the shortest path algorithm simulation results and the actual characteristics of the transportation network, and proposes a simulation data fitting method based on two network parameters and Bellman-Ford, Dijkstra, and Floyd algorithms. The route optimization scheme, and the above-mentioned design scheme was implemented in the transportation system, and the scheme verification was carried out. Finally, this article describes in detail the overall debugging process and operating results of the transportation system, thereby fully verifying the feasibility and correctness of the design and implementation methods of the intelligent transportation system based on the Internet of Things. The research results show that when the INF-PROPORTION is small, the Dijkstra algorithm is better than the Bellman-Ford algorithm. When INF-PROPORTION=0.3, the two algorithms T overlap. Since then, the advantages of the Bellman-Ford algorithm gradually appear, but it is approaching in INF-PROPORTION. At 1 o’clock, the Dijkstra algorithm has a sharp decrease, which is again smaller than the Bellman-Ford algorithm. The second loop condition in the main loop of Dijkstra’s algorithm cannot be satisfied, resulting in a decrease in T.
- Published
- 2021
20. Experimental Discussion on Fire Image Recognition Based on Deep Learning
- Author
-
Fang Qu and Yongyi Cui
- Subjects
History ,Computer science ,business.industry ,Deep learning ,ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION ,Computer vision ,Artificial intelligence ,business ,Computer Science Applications ,Education - Abstract
Fire detection technology based on video images is an emerging technology that has its own unique advantages in many aspects. With the rapid development of deep learning technology, Convolutional Neural Networks based on deep learning theory show unique advantages in many image recognition fields. This paper uses Convolutional Neural Networks to try to identify fire in video surveillance images. This paper introduces the main processing flow of Convolutional Neural Networks when completing image recognition tasks, and elaborates the basic principles and ideas of each stage of image recognition in detail. The Pytorch deep learning framework is used to build a Convolutional Neural Network for training, verification and testing for fire recognition. In view of the lack of a standard and authoritative fire recognition training set, we have conducted experiments on fires with various interference sources under various environmental conditions using a variety of fuels in the laboratory, and recorded videos. Finally, the Convolutional Neural Network was trained, verified and tested by using experimental videos, fire videos on the Internet as well as other interference source videos that may be misjudged as fires.
- Published
- 2021
21. Research on Face Recognition Algorithm Based on Multi-Class Support Vector Machine
- Author
-
Hui Li, Jie Xu, Huanyu Li, Chong-Yue Shi, Ping Wang, Zhiyang Lin, and Liu-Xun Xue
- Subjects
Support vector machine ,History ,Class (computer programming) ,business.industry ,Computer science ,ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION ,Artificial intelligence ,business ,Facial recognition system ,Computer Science Applications ,Education - Abstract
Facial recognition is one of the main research directions in the field of artificial intelligence and image processing. It has been widely used in identity authentication, video surveillance and biological detection. Because it is non-contact, natural, convenient and reliable, facial recognition has become a popular choice for biometric systems. The accuracy of facial recognition still needs to be improved, the main goal of this paper is to improve the accuracy of face recognition. Based on the support vector machine method, the focus is on the feature extraction and feature matching of face images. In view of the particularity of face images, the pre-processing of face images is studied. In this paper, grayscale normalization and geometric normalization pre-processing methods are used. In order to reduce the interference factors of the image as much as possible, the features are high-lighted, and the non-featured parts are weakened, this paper adopts the Histogram of Oriented Gradient feature extraction method. Then we proposed a new method based on SVM, which uses a one-to-many method to construct multiple SVM classifiers, selects the optimal parameters through repeated experiments, and selects ORL face database for testing. The recognition rate can reach about 98.5%.
- Published
- 2021
22. Scene Understanding Technology of Intelligent Customer Service Robot Based on Deep Learning
- Author
-
Jianfeng Zhong
- Subjects
History ,Computer science ,Human–computer interaction ,business.industry ,Deep learning ,Customer service ,Robot ,Artificial intelligence ,business ,Computer Science Applications ,Education - Abstract
As a value-added service that improves the efficiency of online customer service, customer service robots have been well received by sellers in recent years. Because the robot strives to free the customer service staff from the heavy consulting services in the past, thereby reducing the seller’s operating costs and improving the quality of online services. The purpose of this article is to study the intelligent customer service robot scene understanding technology based on deep learning. It mainly introduces some commonly used models and training methods of deep learning and the application fields of deep learning. Analyzed the problems of the traditional Encoder-Decoder framework, and introduced the chat model designed in this paper based on these problems, that is, the intelligent chat robot model (T-DLLModel) obtained by combining the neural network topic model and the deep learning language model. Conduct an independent question understanding experiment based on question retelling and a question understanding experiment combined with contextual information on the dialogue between online shopping customer service and customers. The experimental results show that when the similarity threshold is 0.4, the method achieves better results, and an F value of 0.5 is achieved. The semantic similarity calculation method proposed in this paper is better than the traditional method based on keywords and semantic information, especially when the similarity threshold increases, the recall rate of this paper is significantly better than the traditional method. The method in this article has a slightly better answer sorting effect on the real customer service dialogue data than the method based on LDA.
- Published
- 2021
23. Research on Networked Product Packaging Design Based on Internet of Things Technology
- Author
-
Si Li
- Subjects
World Wide Web ,History ,Computer science ,business.industry ,Packaging and labeling ,Internet of Things ,business ,Computer Science Applications ,Education - Abstract
In recent years, with the improvement of Internet of Things technology and the continuous improvement of economic level, people’s consumption consciousness has also changed, especially for the packaging of networked products put forward higher requirements. This paper mainly studies the visual expression of networked product based on Internet of Things technology. Starting from the increasing influence of Internet electronic consumption in China’s economic consumption system, this paper deeply discusses the systematic product logistics packaging design under the Internet consumption form. This paper analyzes and discusses the differences between Internet consumer commodity packaging and physical consumer commodity packaging in functional orientation, added value of packaging, systematic visual design and other aspects.
- Published
- 2021
24. Research on the Application of Uninterrupted 5G Private Network in Smart Grid
- Author
-
Hang Liu, Jielin Zeng, Long Wang, Lin Tian, Guosheng Lu, and Hailong Zhu
- Subjects
History ,Smart grid ,Computer science ,business.industry ,business ,5G ,Computer Science Applications ,Education ,Private network ,Computer network - Abstract
Based on the demand for smart grid 5G network, this paper studies 5G mobile communication technology and the industry's 5G private network construction mode. Combined with power grid requirements, this paper focuses on analyzing the uninterrupted 5G private network solution, the principal of the solution is also explained. Taking a 5G test network deployed at a converter station as an example, the construction, isolation, operation, and maintenance plans of the uninterrupted 5G private network solution in the power communication network is proposed, the actual tests verify the feasibility of the continuous 5G private network. This paper will provide reference for the promotion and application of 5G private network technology in the power grid.
- Published
- 2021
25. Research on the detection of arc fault in series connection of landscape power supply
- Author
-
Xuewen Zhang, Xiong Yingpeng, Yi Deng, and Li Yuanli
- Subjects
Computer Science::Hardware Architecture ,History ,Computer science ,business.industry ,Electrical engineering ,Arc-fault circuit interrupter ,Series and parallel circuits ,business ,Computer Science Applications ,Education ,Power (physics) - Abstract
Aiming at the series fault arc phenomenon in landscape lighting and the hidden dangers of electrical fires, in this paper, a landscape power supply series fault arc model is constructed and its model is simulated. The simulation results show that when a fault occurs, the arc current becomes smaller (almost zero) due to the increase in the impedance of the lighting circuit; this phenomenon is called the “current zero off” phenomenon of the fault arc current. The current zero off phenomenon of the fault arc current is the main fault feature in the landscape lighting circuit. In this paper, the wavelet algorithm is used to detect the fault current waveform. According to the fault characteristics, by judging whether the modulus maximum value of the wavelet coefficient has periodic characteristics with an interval of 100±15 sampling points, it is analyzed whether a series-type arc fault occurs. The built physical model verifies the feasibility and correctness of the arc detection algorithm. The research results of this paper have certain reference value for the detection and application of fault arc.
- Published
- 2021
26. Secure Cloud Risk Architecture analysis for Mobile Banking system and its performance analysis based on Machine learning approaches
- Author
-
M. Sreevani, P. Lalitha Suryakumari, and P. Rajarajeswari
- Subjects
History ,Mobile banking ,Multimedia ,Computer science ,business.industry ,Cloud computing ,Architecture ,computer.software_genre ,business ,computer ,Computer Science Applications ,Education - Abstract
With advances in the mobile communications, many service-related tasks can be made quickly and easily. Mobile banking is one such service that has eliminated the need for a consumer to go to a branch to carry out many common transactions. In a country like India, where the last mile reach through brick-and-mortar banking facilities, mobile phones can complement the reach. This paper describes how mobile cloud architecture can be employed for banking and services to customers to enhance their banking experience as well as ensuring information security. This paper focuses on cloud-based risk architecture for banking solutions to address various issues related to mobile banking such as processing speed and storage capacity. Improved random forecast algorithm is used for the evaluation of the system. This proposed system achieves 99% of the system.
- Published
- 2021
27. Integration of Simulation Systems into the Software and Hardware Platform of Virtual Training Complexes
- Author
-
D Teselkin, D Dedov, and A Nazarova
- Subjects
History ,Software ,business.industry ,Computer science ,Embedded system ,Virtual training ,business ,Computer Science Applications ,Education - Abstract
The implementation of training complexes based on virtual reality for the training of specialists in machine-building, chemical, mining and other industries is associated with the need to solve a number of tasks. These include simulating various physical processes (temperature, humidity, and air pressure), loads (speed of movement and angle of inclination of the surface), and other external factors that cannot be reliably simulated in virtual reality. Therefore, an urgent task is to integrate various simulation systems into the software and hardware platform of virtual training complexes, which will provide a realistic immersion in the subject area due to virtual reality, as well as simulate the necessary external influences on the student. The paper considers this process by the example of integration of a simulation system of physical loads into virtual training complexes. The basis of the simulation system under consideration is a controlled treadmill. The use of treadmills allows students to develop muscle memory, perform physical training and increase the degree of immersion in virtual reality, which positively affects the effectiveness of their training. However, their integration requires the solution of a number of practical tasks for the transfer of information between the individual subsystems of the virtual training complex. The paper considers algorithms and software for solving these problems. The described approaches can be used to integrate various simulation systems into the software and hardware platform of virtual training complexes for the organization of comprehensive training of specialists.
- Published
- 2021
28. Reverse Modeling and Design of Radar Cat’s Eye Based on GeomagicDesign
- Author
-
Ying Jin, Juanrong Zhang, Xuzhao Han, and Lin Kong
- Subjects
History ,law ,Computer science ,business.industry ,Computer vision ,Artificial intelligence ,Radar ,Reverse modeling ,business ,Computer Science Applications ,Education ,law.invention - Abstract
This paper takes the physical model of Radar Cat’s Eye as the research object, based on geomagicdesign software’s powerful reverse modeling function, the reverse modeling and design process of Radar Cat’s Eye is explained in detail. The detailed steps and main precautions of scanner calibration in the process of Radar Cat’s Eye reverse modeling are given. At the same time, the main contents of model scanning, data processing, reverse modeling, model comparative analysis and so on are also introduced and explained in detail. In short, the relevant contents of this paper provide reference and help for the reverse modeling and design of other models.
- Published
- 2021
29. Hardware and Software Structure for a Social Robot Capable of Situation Analysis
- Author
-
N Kimr, N Bodunkov, and J Sinyavskaya
- Subjects
Structure (mathematical logic) ,History ,Software ,Social robot ,Computer science ,business.industry ,Human–computer interaction ,business ,Computer Science Applications ,Education ,Situation analysis - Abstract
This paper discusses structuring of hardware and software for an autonomous social robot. It shows that the real-world social robot operations face the challenge of environmental variability and uncertainty of the objective parameters. Thus, a social robot must be capable of situation analysis for better autonomy. We propose a modular distributed structure of the control system. Separate modules monitor the status and control the subsystems of the robot. General coordination of subsystems is provided by the Supervisor module. For the robot to function autonomously, the Supervisor must be capable of situation analysis and its key functions: objective retrieval and analysis, situation description, configuring and strategizing the solution. The robot’s sensory inputs help acquire the objective and its parameters to describe the situation. Description relies on the database of a priori knowledge of the environment and its objects. Analysis is linked to a reduction in the uncertainty of the objective parameters and situation description. For a case study, the paper demonstrates a maze-solving strategy as affected by the situation.
- Published
- 2021
30. Music Network Data Analysis Based on ISOMAP Algorithm Model
- Author
-
Shangqian Liu, Yue Li, Yanling Xu, and Kai Zhong
- Subjects
History ,business.industry ,Computer science ,Network data ,Isomap algorithm ,Pattern recognition ,Artificial intelligence ,business ,Computer Science Applications ,Education - Abstract
The development of music is a tortuous process, and the network relationship between each genre and each artist is intricate. In order to have a better understanding of the history of music, this paper tells the stories hidden in the history of music by means of data processing. Firstly, this paper establishes a model to evaluate the similarity between music by using ISOMAP algorithm. At the same time, the forest evolution model was established to mark the most revolutionary musical characters. Finally, using the Page-Rank algorithm, we get the founders of several music genres. It turns out that the figures who led the development of music don’t coincide with the figures who revolutionized music. Through the analysis of this paper, we can more clearly understand the development of music and the evolution of genres.
- Published
- 2021
31. Offline Signature Verification System Using SVM Classifier with Image Pre-processing Steps and SURF Algorithm
- Author
-
Swee Kheng Eng and Li Wen Goon
- Subjects
History ,Svm classifier ,Computer science ,business.industry ,Image pre processing ,Verification system ,Pattern recognition ,Artificial intelligence ,business ,Signature (logic) ,Computer Science Applications ,Education - Abstract
A signature is a mark or name that represents the identity of the people and the Signature Verification System (SVS) is used to validate the identity of people. The signature verification system is mostly used for bank cheques, vouchers, intelligence agencies and others. There are two types of SVS which are online and offline signature verification systems. The paper deals with an offline signature verification system. The proposed system consists of four main stages, (i) image acquisition, (ii) image pre-processing, (iii) feature extraction and (iv) classification. The image pre-processing steps involved binarization, noise removal using Gaussian filter and image resizing and thinning. In the feature extraction stage, Bag-of-Features with the Speeded Up Robust Features (SURF) extractor was utilized. In the third stage, the Support Vector Machine (SVM) classifier is used. Lastly, the confusion matrix and the verification rate were used to evaluate the performance of the classifier. In this paper, we implement and compare the performance of the signature verification system without entering the user ID and the signature verification system entering the user ID. For the ratio of 75% and 25% of the training and testing, respectively, the average accuracy for the signature verification system without entering the user ID is 71.36%, whereas the average accuracy for the signature verification system entering the user ID is 79.55%.
- Published
- 2021
32. An Adaptive Frequency PLL Approach for Grid Connected Multifunctional Inverter for Residential Applications
- Author
-
A A J Basha, H K Yada, and M R Anumandla
- Subjects
Phase-locked loop ,History ,Computer science ,business.industry ,Electrical engineering ,Inverter ,Grid ,business ,Computer Science Applications ,Education - Abstract
This paper presents an adaptive frequency Phase locked loop (PLL) based approach for grid connected multifunctional inverter is presented for residential applications. The proposed control structure deals with non-linear loads and also non ideal grid voltages like magnitude variation, frequency variation, unbalance harmonics, etc. and can effectively address the DC offset in a voltage signal which in turn improves the power quality. A third order generalized integrator based PLL with adaptive frequency and DC offset elimination blocks will effectively deal with the power grid voltage fluctuations, frequency variations and eliminate the phase difference between PLL output. This approach is implemented as control algorithm for single-stage single-phase grid connected multifunctional inverter topology for PV applications which feeds energy to the grid. The Maximum Power Point Tracking is obtained by Perturb & Observe method for extracting maximum power from a Photovoltaic system. A detailed analysis with the proposed control technique is presented in this paper. Experimental tests are conducted at various operating conditions to describe and verify the performance of the proposed control using MATLAB / Simulink.
- Published
- 2021
33. Application and Research of Convolution Neural Network in MRI Image Classification and Recognition
- Author
-
Fei Gao, Xuemei Hou, Jianping Wu, and Minghui Wu
- Subjects
History ,Mri image ,Computer science ,business.industry ,Pattern recognition ,Artificial intelligence ,business ,Convolutional neural network ,Computer Science Applications ,Education - Abstract
The traditional hepaticcell carcinoma (HCC) pathological grading depends on biopsy, which will cause damage to the patient's body and is not suitable for everyone's pathological grading diagnosis. The purpose of this paper is to study the pathological grading of liver tumors on MRI images by using deep learning algorithm, so as to further improve the accuracy of HCC pathological grading. An improved network model based on SE-DenseNet is proposed. The nonlinear mapping relationship between feature channels is modeled and recalibrated using attention mechanism, and rich deep-seated features are extracted, so as to improve the feature expression ability of the network. The method proposed in this paper is verified on the data set including 197 patients, including 130 training sets and 67 test sets. The experimental results are evaluated by receiver operating characteristic (ROC) and area under the ROC curve (AUC). The improved SE-Densenet network achieves good results, and AUC 0.802 is obtained on the test set. The experimental results show that the method proposed in this paper can well predict the pathological grade of HCC.
- Published
- 2021
34. High Camouflage Intrusion Detection Method for Structured Database Based on Multi Pattern Matching
- Author
-
Xun Zhu, Fengjuan Ma, and Dawei Song
- Subjects
History ,business.industry ,Computer science ,Camouflage ,Pattern recognition ,Pattern matching ,Artificial intelligence ,Intrusion detection system ,business ,Computer Science Applications ,Education - Abstract
with the rise and rapid development of mobile communication, intelligent terminal and data system, we are entering the era of mobile Internet. In recent years, more and more data need to be processed and transmitted in daily life, and structured data is becoming more and more important. Among them, multi-mode matching technology can search data in a wider range. Matching for multiple patterns at a time avoids unnecessary matching, accelerates the matching process, and helps to find longer matching information and obtain higher accuracy. This paper mainly introduces the high camouflage intrusion detection method of structured database based on multi-mode matching. This paper uses the high disguised intrusion detection method of structured database based on multi-mode matching, collects sensitive information of wireless access points and stations through the communication of WLAN in multimodal matching, then intercepts and forges data packets to initiate replay attack. Replay attack is characterized by abnormal traffic in the network, which can be detected by statistical analysis. The experimental results show that the high camouflage intrusion detection method based on multi-mode matching makes the camouflage intrusion detection rate increase by 23%. The limitations of the design and research of camouflage intrusion detection are analyzed, discussed and summarized, so as to enrich the academic research results.
- Published
- 2021
35. Automated Quadruped Robot Simulation using Internet of Things and MATLAB
- Author
-
Harsh Gupta, Rishita Shanker, Richik Ray, Swagatika Mohanty, and Mohit Sharan
- Subjects
History ,Computer science ,business.industry ,Real-time computing ,Robot ,MATLAB ,Internet of Things ,business ,computer ,Computer Science Applications ,Education ,computer.programming_language - Abstract
In this paper, a MATLAB Simulink model of a Quadruped Robot is presented alongside its remote, control and monitor user interface that has been developed by using the fundamentals of Internet of Things on a Node-Red Flow and the FRED-Cloud Server. Robotics and Automation over the recent years have developed exponentially and hence have been a key factor in the rise of Industry 4.0 which has usurped manual supervision and operation in industrial and manufacturing processes around the globe. The design and creation of technologically advanced robots integrated with computer-based software for their automation has not only successfully made the tasks facile to manage within short spans of time, but also has increased the efficiency notably. The stability and mobility of quadruped robots is considered to be ideal on differing terrains with minimal subtle changes, thereby making it an asset. Internet of Things on the other hand, has paved its way over the control of robots as well, with its unparalleled benefits. This paper is focused on the design and execution of the Quadiuped model which includes the observation of the various significant graphs achieved post simulation with respect to electrical values such as power and current consumption, and a visual animation of the robot running in the workspace. Furthermore, a single platform is developed and displayed that allows a user to log in for security puiposes and thereby, operate and monitor the functions and conditions of the bot easily, ranging from remote visual support, directional integrity, damage control and more, without the need of multiple platforms to carry out varying tasks with respect to control.
- Published
- 2021
36. Curvelet Transform based Denoising of Multispectral Remote Sensing Images
- Author
-
S.L. Prathapa Reddy, Santosh Pawar, and P. Lokeshwara Reddy
- Subjects
History ,Computer science ,business.industry ,Noise reduction ,Curvelet transform ,Computer vision ,Artificial intelligence ,business ,Computer Science Applications ,Education ,Multispectral pattern recognition - Abstract
With the advent of sensor technology, the exertion of multispectral image (MSI) is comely omnipresent. Denoising is an essential quest in multispectral image processing which further improves recital of unmixing, classification and supplementary ensuing praxis. Explication and ocular analysis are essential to extricate data from remote sensing images for broad realm of supplications. This paper describes curvelet transform based denoising of multispectral remote sensing images. The implementation of curvelet transform is done by using both wrapping function and unequally spaced fast Fourier transform (USFFT) and they diverge in selection of spatial grid which is used to construe curvelets at every orientation and scale. The coefficients of curvelets are docket by a scaling factor, angle and spatial location criterion. This paper crisps on denoising of Linear Imaging Self Scanning Sensor (LISS) III images. The proposed denoising approach has also been collated with some existing schemes for assessment. The efficacy of proposed approach is analyzed with calculation of facet matrices such as Peak signal to noise ratio and Structural similarity at distinct variance of noise..
- Published
- 2021
37. Application of Data Mining Technology in Software Engineering
- Author
-
Xiaobin Hong
- Subjects
History ,Computer science ,business.industry ,Software engineering ,business ,Computer Science Applications ,Education - Abstract
With the rapid development of informatization, computer database software systems have entered various fields of society, which has brought about the explosive growth of industry data. Faced with massive amounts of data, computers with limited storage capacity have to abandon some outdated data, and the application of various data mining technologies related to it has gradually matured. The purpose of this article is to discuss the application research of data mining technology in software engineering. This article analyzes the correlation analysis of a large number of bug repair source code update data and bug defect reports in the version control system SVN and the defect tracking system Bugzilla in the software engineering project development process, and tries to classify the bug report by data mining technology: defect changes and potential defects change. Starting from large-scale software engineering projects, apply data mining technology to the huge software engineeri ng knowledge base. Especially the software development and maintenance are explained, as well as the more challenging problems in the future. This paper uses data mining technology to study the dependency of the source code files of each module of the software system, and helps software developers quickly understand the software architecture by understanding the interrelationships between the modules, and provides suggestions for modification paths. Experimental research shows that this paper compares with F-measure and concludes that FL-M-GSpan algorithm is better than TS-M-GSpan algorithm. At the same time, it is found that the FL-M-GSpan algorithm always has a better accuracy rate close to 95%, while the TS-M-GSpan algorithm always has a better recall rate.
- Published
- 2021
38. The Realization and Optimization Technology of Recognition Algorithm Based on Tensorflow Deep Learning Mechanism
- Author
-
Wencai Xu
- Subjects
History ,Computer science ,business.industry ,Deep learning ,Artificial intelligence ,Recognition algorithm ,business ,Realization (systems) ,Mechanism (sociology) ,Computer Science Applications ,Education - Abstract
With the rapid development of today’s technological society, recognition algorithms have received more and more attention. In addition, in recent years, deep learning algorithms have developed rapidly at the theoretical level, and related new technologies have also been applied to various industries. TensorFlow is a deep learning framework that performs well in all aspects. The purpose of this article is to study the realization of recognition algorithms based on TensorFlow’s deep learning mechanism and their optimization techniques. The target detection algorithm used in the system in this paper combines deep learning technology to replace the traditional method based on convolutional filtering. The paper is based on the TensorFlow deep learning framework. TensorFlow is an open source software library for machine intelligence. The learning software library of the network learning framework. This article uses a semi-automatic labeling method combined with an incremental learning algorithm to label the data set. After labeling the data, the parameters are set, the model is trained, and the model is finally trained and applied to the detection system. Studies have shown that: in the recognition algorithm, only the single sub-analysis stream is considered, and the short video sequence analysis stream can get the most excellent accuracy. Compared with the second best long video sequence analysis stream, it can also increase by about 3%.
- Published
- 2021
39. Low voltage abnormal user identification based on improved fish swarm algorithm
- Author
-
Zongyao Wang, Zhihao Xu, Jun Zhou, Bing Kang, Chuan Liu, Min Sun, and Tianqi Meng
- Subjects
History ,Identification (information) ,Computer science ,business.industry ,%22">Fish ,Swarm behaviour ,Pattern recognition ,Artificial intelligence ,business ,Low voltage ,Computer Science Applications ,Education - Abstract
The power consumption readings of sub meter and total meter of distribution transformer of low-voltage users follow the law of conservation of energy. The meter power loss rate of abnormal low-voltage users must also be abnormal. This paper studies the solution of the meter power loss rate under the four abnormal power consumption scenarios of single (multi) user and full (partial) period. The traditional linear solution method has accurate identification effect for the abnormal power consumption scenario of full period, but it cannot identify the abnormal power consumption scenario of partial period. In this paper, an improved artificial fish swarm algorithm is proposed. By adjusting the fixed step to the adaptive step, the power loss rate of each sub meter is obtained, and the abnormal power users are pinpointed. The research results are verified by simulation examples on IEEE European Low Voltage Test Feeder. The results show that the improved artificial fish swarm algorithm in this paper can identify abnormal power users for the above four abnormal electric field scenarios. The algorithm provides a new alternative for the identification of abnormal low voltage users.
- Published
- 2021
40. Internet of Things Enabled Smart Animal Farm Prototype
- Author
-
S Selvakumar, R Surya, E Dhanyasree, P Arvindan, and Arjun Easwaran
- Subjects
World Wide Web ,History ,Computer science ,business.industry ,Internet of Things ,business ,Computer Science Applications ,Education - Abstract
Livestock plays very important economic, social and cultural roles in the well being of rural communities across the world. Quality environmental conditions, automation and monitoring are the key necessities of running a good and profitable livestock farm. Air quality, temperature of the surroundings and humidity play a major role while deciding the fan speeds of the exhaust System used in all aspects of livestock farming. Another important part of livestock production is increasing incubation speeds of eggs by performing artificial incubation. It is a requirement to maintain the temperature at a constant value in this system. This paper describes two mutually exclusive Fuzzy Logic algorithm-based systems to automate the exhaust system and an artificial egg incubator. The other important part of a livestock farm is production of milk and milk products. It is required to monitor the health of cows by overseeing their activities at any point of time. This can be done by determining and monitoring the activities performed by the cow. This paper describes a simple Deep Learning Model to classify the activities of a cow broadly as standing, walking or grazing. The Exhaust and the Incubator system are controlled and monitored using Internet of Things (IOT) System using a native web application developed using the Flask framework.
- Published
- 2021
41. Efficient Distributed Image Recognition Algorithm of Deep Learning Framework TensorFlow
- Author
-
Wencai Xu
- Subjects
History ,Computer science ,business.industry ,Deep learning ,Computer vision ,Artificial intelligence ,business ,Computer Science Applications ,Education - Abstract
Deep learning requires training on massive data to get the ability to deal with unfamiliar data in the future, but it is not as easy to get a good model from training on massive data. Because of the requirements of deep learning tasks, a deep learning framework has also emerged. This article mainly studies the efficient distributed image recognition algorithm of the deep learning framework TensorFlow. This paper studies the deep learning framework TensorFlow itself and the related theoretical knowledge of its parallel execution, which lays a theoretical foundation for the design and implementation of the TensorFlow distributed parallel optimization algorithm. This paper designs and implements a more efficient TensorFlow distributed parallel algorithm, and designs and implements different optimization algorithms from TensorFlow data parallelism and model parallelism. Through multiple sets of comparative experiments, this paper verifies the effectiveness of the two optimization algorithms implemented in this paper for improving the speed of TensorFlow distributed parallel iteration. The results of research experiments show that the 12 sets of experiments finally achieved a stable model accuracy rate, and the accuracy rate of each set of experiments is above 97%. It can be seen that the distributed algorithm of using a suitable deep learning framework TensorFlow can be implemented in the goal of effectively reducing model training time without reducing the accuracy of the final model.
- Published
- 2021
42. A Tree Based Machine Learning Approach for PTB Diagnostic Dataset
- Author
-
Sathiya Narayanan and S Premanand
- Subjects
History ,Computer science ,business.industry ,Tree based ,Artificial intelligence ,Machine learning ,computer.software_genre ,business ,computer ,Computer Science Applications ,Education - Abstract
The primary objective of this particular paper is to classify the health-related data without feature extraction in Machine Learning, which hinder the performance and reliability. The assumption of our work will be like, can we able to get better result for health-related data with the help of Tree based Machine Learning algorithms without extracting features like in Deep Learning. This study performs better classification with Tree based Machine Learning approach for the health-related medical data. After doing pre-processing, without feature extraction, i.e., from raw data signal with the help of Machine Learning algorithms we are able to get better results. The presented paper which has better result even when compared to some of the advanced Deep Learning architecture models. The results demonstrate that overall classification accuracy of Random Forest, XGBoost, LightGBM and CatBoost, Tree-based Machine Learning algorithms for normal and abnormal condition of the datasets was found to be 97.88%, 98.23%, 98.03% and 95.57% respectively.
- Published
- 2021
43. Application of Cloud Computing Technology in Information System Construction
- Author
-
Renxian Zeng
- Subjects
History ,business.industry ,Computer science ,Distributed computing ,Information system ,Cloud computing ,business ,Computer Science Applications ,Education - Abstract
With the rapid development and improvement of information technology, information system construction has new requirements and goals. Cloud computing technology is an inevitable choice in the construction of information system. By taking cloud computing technology as the basic structure framework, the phenomenon of data information island can be broken. The purpose of this paper is to study the application of cloud computing in the construction of information system. Taking the management mode of university campus as an example, based on the research of cloud computing technology, virtual machine technology and Internet of things technology, this paper discusses the data resource management algorithm of smart campus. Aiming at the scheduling model, strategy and research objectives of cloud computing resources in data center, this paper proposes a method of initial allocation and adaptive dynamic scheduling of virtual machine resources. According to the multi-dimensional vector characteristics of virtual machine, this paper proposes a resource allocation algorithm based on multi-objective evolution, and gives four important strategies. The experimental results show that the four advantages and strategies can effectively reduce the number of virtual machine migration and reduce the adverse impact on the overall performance of cloud computing core network.
- Published
- 2021
44. Design of Single-lamp Monitoring System for Airfield Lighting Based on Broadband Power Line Carrier Communication
- Author
-
Li Tuo, Xiaolong Yang, Chen Fei, Yang Hao, and Ma Xiaodan
- Subjects
History ,Power-line communication ,Computer science ,business.industry ,Broadband ,Electrical engineering ,Monitoring system ,business ,Computer Science Applications ,Education - Abstract
Considering the problems of low communication rate and large communication delay of the traditional single-lamp monitoring system for airfield lighting based on narrow-band power line carrier communication technology, a solution of single-lamp monitoring system for airfield lighting based on broadband power carrier communication technology is proposed. Firstly, this paper has made a comparison of advantages and disadvantages between narrow-band power line carrier communication technology and broadband power line carrier communication technology, and briefed the problems faced by traditional single-lamp monitoring system based on narrow-band power line carrier communication. Taking technical characteristics into consideration, broadband power line carrier communication technology is selected for the development of a new single-lamp monitoring system for airfield lighting. Secondly, this paper articulated the design and development process of new airfield lighting single-lamp monitoring system based on broadband power line carrier communication technology, from the formulation of the overall architecture scheme of the system to the realization of local convergent equipment, and focused on the analysis of hardware and software development process of single-lamp monitoring module. Finally, this paper set up a test environment, and verified the performance index by experiments. The test results show that the system meets the design index requirements, can improve the performance of the single-lamp monitoring system for airfield lighting, effectively solves the problems faced by the traditional system, and can further meet the needs of the airport for airfield lighting monitoring and control.
- Published
- 2021
45. The Acquisition of Position and Orientation of the Conveyor Belt Workpiece Based on the Inter Frame Difference in ROI in Camera Video
- Author
-
Jian Wang and Ziting Chen
- Subjects
History ,Position (vector) ,business.industry ,Computer science ,Orientation (geometry) ,Inter frame ,Conveyor belt ,Computer vision ,Artificial intelligence ,business ,Computer Science Applications ,Education - Abstract
Conveyor belt transfer is a widely used transportation means in industry and agriculture, with the help of the robot arms the workpiece on the belt can be picked and placed, replacing human sorters for production lines work. The position and orientation of the workpiece are important for grabbing by the robot arms. The goal of the paper was to investigate the acquisition of the position and orientation of the conveyor belt workpiece by means of the camera video overhead looking down the belt. The proposed method is the inter frame difference in nature, using the conveyor belt background as the first frame, but the other frames were not used wholly as usually, only an ROI all around the conveyor belt in the camera video was chosen, and the inter frame difference was carried out in the ROI. The ROI was of the same width as that of the belt in the video which was known in advance, while the length of the ROI was arbitrary, so one pixel in the frame was scaled to the actual length conveniently. Every read frame behind the background was computed the difference with the background in such ROI, and the four vertexes coordinates of the rectangle workpiece image on the belt were obtained when it passed the ROI, and then the distance apart from the right belt boundary was calculated due to the proportional relation between the width of workpiece and that of the ROI. Two kind workpiece orientation on the belt toward the left and right were judged using the same obtained four vertexes coordinates by means of Euclidian length, and the tilt angle was calculated by arc tangent function in favour of two narrow sides of rectangle workpiece grab. The actual test showed that the method of obtaining the position and orientation of workpiece on the belt proposed in the paper could be realized correctly.
- Published
- 2021
46. An Efficient Interconnection System for Neural NOC Using Fault Tolerant Routing Method
- Author
-
A. Pradeep kumar, T. Srinivas Reddy, K. Jamal, and Y. Devendar Reddy
- Subjects
History ,Interconnection ,Computer science ,business.industry ,Hardware_INTEGRATEDCIRCUITS ,Fault tolerance ,Hardware_PERFORMANCEANDRELIABILITY ,Routing (electronic design automation) ,business ,Computer Science Applications ,Education ,Computer network - Abstract
Large scale Neural Network (NN) accelerators typically have multiple processing nodes that can be implemented as a multi-core chip, and can be organized on a network of chips (noise) corresponding to neurons with heavy traffic. Portions of several NoC-based NN chip-to-chip interconnect networks are linked to further enhance overall nerve amplification capacity. Large volumes of multicast on-chip or cross-chip can further complicate the construction of a cross-link network and create a NN barrier of device capacity and resources. In this paper, this refer to inter-chip and inter-chip communication strategies known as neuron connection for NN accelerators. Interconnect for powerful fault-tolerant routing system neural NoC is implemented in this paper. This recommends crossbar arbitration placement, virtual interrupts, and path-based parallelization strategies in terms of intra-chip communications for the virtual channel routing resulting in higher NoC output at lower hardware costs. A lightweight NoC compatible chip-to-chip interconnection scheme is proposed regarding to inter-chip communication for multicast-based data traffic to enable efficient interconnection for NoC-based NN chips. Moreover, the proposed methods will be tested with four Field Programmable Gate Arrays (FPGAs) on four hard-wired deep neural network (DNN) chips. From the experimental results it can be illustrate that a high throguput can obtained effectively by the proposed interconnection network in handling thedata traffic and low DNN through advanced links.
- Published
- 2021
47. MAC Based Security Integration using Face Recognition in Cloud Environment
- Author
-
Sharma Yash and Pandey Neeraj Kumar
- Subjects
History ,business.industry ,Computer science ,Cloud computing ,Computer security ,computer.software_genre ,business ,Facial recognition system ,computer ,Computer Science Applications ,Education - Abstract
The major challenges, which come across face recognition system, are to find the age and gender in 2D/3D image of the person specifically in cloud environment. This paperis centered on face detection with MAC (Media Access Control) and biometric technology. Face scanning along with machine’s MAC address and biometric technologies has been shown to improve security controls. Face recognition can be used to search and label users and their assigned machines for sensitive purposes. Following that, it was stored in a specific database with their unique ID. In addition, the verification process has begun by comparing the models in the database. Face scanning along with speech and biometric technologies is used to improve security controls. Face recognition system may also be set up in high security machines to improve protection by allowing only registered individuals or others users. Related strategies for determining the age and gender and 2D/3D image from a specific picture are explored, as well as several modern methods for preserving protection. In this paper, the full model is explored independently with security implemented in cloud environment. The proposed model of the paper provides the integrated security features using MAC address of machine and face recognition of the machine user.
- Published
- 2021
48. Telecommunications package recommendation algorithm based on Deep forest
- Author
-
Yanhong Zhang, Yingfu Yu, and Meng Wang
- Subjects
History ,Computer science ,business.industry ,Telecommunications ,business ,Computer Science Applications ,Education - Abstract
In view of the wide variety of telecom packages and the difficulty of adapting to the needs of users, this paper introduces a recommendation model for telecom packages based on deep forests. This paper first analyzes the telecom package data, and then optimizes the deep forest according to its characteristics such as discrete, continuous attribute interleaving and high coupling characteristics, including the use of decision trees to discretize continuous features and design continuous window sliding mechanism. These methods can improve the ability of deep forest combination high coupling features. Finally, the model optimization measures were verified by detail experiments. The experimental results show that the optimized deep forest can be applied to the telecom package recommendation field. Compared with other shallow models and unoptimized deep forest models, the deep forest model has increased the F1 score by 5%; after adjusting the deep forest hyper parameters, the F1 score can be increased by 2%.
- Published
- 2021
49. Research on dynamic current sharing method of parallel connected IGBT modules for NPC three level converters
- Author
-
Yingqin Zou, Sheng Yin, and Xi Peng
- Subjects
History ,business.industry ,Computer science ,Current sharing ,Electrical engineering ,Insulated-gate bipolar transistor ,Converters ,business ,Three level ,Computer Science Applications ,Education - Abstract
The parallel connection of IGBTs has been being applied in high power neutral point clamped (NPC) three level converters. This paper investigates the impact of gate parameters (gate resistor and capacitance) on dynamic current imbalance of parallel connected IGBT for NPC three level converter. A gate parameters calculation method is proposed in the paper, and the delay time and collector current difference can be analysed quantitatively. Experimental results have shown the effectiveness of the method.
- Published
- 2021
50. Research on Transmission and Offloading Scheme of MEC-IRS for Distribution Network Service
- Author
-
Bingsen Xia and Yuanchun Tang
- Subjects
Service (business) ,Scheme (programming language) ,History ,Transmission (telecommunications) ,Distribution networks ,Computer science ,business.industry ,business ,computer ,Computer Science Applications ,Education ,Computer network ,computer.programming_language - Abstract
the paper introduces IRS to assist offloading, and the propagation Environment can be intelligently changed by changing the reflection unit of the IRS, This article proposes an IRS-assisted MEC power distribution Internet of Things system, and studies the gain effect of IRS in the MEC system. In this system, the single antenna equipment can choose to unload a small part of its computing task to the edge computing node of the distribution Internet of things through the multi antenna access point with the help of IRS. In this paper, the delay minimization problem of the whole system is established, the DNQ reinforcement learning algorithm is used to solve the problem, which can effectively change the coverage of smart substations.
- Published
- 2021
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.