2021 4th International Conference on Artificial Intelligence and Big Data (ICAIBD 2021) - Chengdu, China 28 - 31 May 2021
←
→
Page content transcription
If your browser does not render page correctly, please read the page content below
2021 4th International Conference on Artificial Intelligence and Big Data (ICAIBD 2021) Chengdu, China 28 – 31 May 2021 IEEE Catalog Number: CFP21Q12-POD ISBN: 978-1-6654-3038-8
Copyright © 2021 by the Institute of Electrical and Electronics Engineers, Inc. All Rights Reserved Copyright and Reprint Permissions: Abstracting is permitted with credit to the source. Libraries are permitted to photocopy beyond the limit of U.S. copyright law for private use of patrons those articles in this volume that carry a code at the bottom of the first page, provided the per-copy fee indicated in the code is paid through Copyright Clearance Center, 222 Rosewood Drive, Danvers, MA 01923. For other copying, reprint or republication permission, write to IEEE Copyrights Manager, IEEE Service Center, 445 Hoes Lane, Piscataway, NJ 08854. All rights reserved. *** This is a print representation of what appears in the IEEE Digital Library. Some format issues inherent in the e-media version may also appear in this print version. IEEE Catalog Number: CFP21Q12-POD ISBN (Print-On-Demand): 978-1-6654-3038-8 ISBN (Online): 978-1-6654-1515-6 Additional Copies of This Publication Are Available From: Curran Associates, Inc 57 Morehouse Lane Red Hook, NY 12571 USA Phone: (845) 758-0400 Fax: (845) 758-2633 E-mail: curran@proceedings.com Web: www.proceedings.com
2021 4th International Conference on Artificial Intelligence and Big Data Table of Contents Preface……………………………..…………………………………………………………………………………..………xiii Conference Committees……………………………………………………………………………………...……....……xv Chapter I: Big Data and Engineering How to Realize Precision Marketing in Catering Industry through Big Data ......................................................1 Siyang Liu Technical Architecture of Big Data Cloud Platform for Intelligent Washing Factory ...........................................8 Chuanxing Zheng Analysis of the Security Strategy of Computer Network Data under the Background of Big Data ...................13 Xiaolan Yu Research on the Impact of Digital Interactive Media on the Stock Market Based on Big Data Text ................17 Jinshui Huang, Jujun Qian, Yangqing Liu A Novel Algorithm using Content-based filtering Technology in Apache Spark for Big Data Analysis..............22 Yolamu Kamukwamba, Liu Chunxiao Chapter II: Data Analysis and Data mining Weighted Cross-Product Constraint Transformation to Optimize Spatial Structure of Data ............................27 Siqing Wang, Deqi Li, Xin Zhang, Shutao Zhang Overview: The Databases of Chemical Components of Traditional Chinese Medicine ...................................32 Yang Li, Xiaomeng Li, Ping Ma, Jingang Ma Microservice Anomaly Detection Based on Tracing Data Using Semi-supervised Learning ...........................38 Min Li, Dingyong Tang, Zepeng Wen, Yunchang Cheng Automatic Market Prediction System Via an Ensembled Model ......................................................................45 Jinxi Liu, Peng Yang, Jingyao Fan, Xiaohan Dou iii
Early Warning and Prevention of non-Compliance of Internal Control Information Disclosure based on data Mining..............................................................................................................................................................49 Na Liu, Lianxi Wang A Novel Scheme for Crawling and Mining of Housing Transaction Data .........................................................54 Luyao Chen, Tao Xu A Fast-Mining Method for Target Behavior Pattern Based on Trajectory Data ................................................59 Qiaowen Jiang, Yu Liu, Shun Sun, Daning Tan Application of Data Mining in Predicting College Graduates Employment ......................................................65 Shouwu He, Xiaoying Li, Jia Chen Chapter III: Machine Learning Real Time Face Mask Detection System using Transfer Learning with Machine Learning Method in the Era of Covid-19 Pandemic .........................................................................................................................................70 Sohaib Asif, Yi Wenhui, Yi Tao, Si Jinhai, Kamran Amjad Static Analysis of Source Code Vulnerability Using Machine Learning Techniques: A Survey ........................76 Jingjing Wang, Minhuan Huang, Yuanping Nie, Jin Li Studying the Reinforcement Learning Techniques for the Problem of Intrusion Detection ..............................87 Quang-Vinh Dang, Thanh-Hai Vo IoT-Based Disaster Detection Model Using Social Networks and Machine Learning ......................................92 Khalid Alfalqi, Martine Bellaiche An Ensemble Machine Learning Method for the Prediction of Heart Disease .................................................98 Sohaib Asif, Yi Wenhui, Yi Tao, Si Jinhai, Hou Jin Recursive Least Squares Policy Control with Echo State Network ...............................................................104 Chunyuan Zhang, Chao Liu, Qi Song, Jie Zhao The Method of Selecting the Evaluation Model for the State of Children's Growth Based on Machine Learning ......................................................................................................................................................................109 Yubin Chen, Dancheng Li, Ning Wang, Changyuan Wu, Zhong Wang Research on Employee Turnover Prediction Based on Machine Learning Algorithms .................................. 114 Jia Yuan iv
Chapter IV: Intelligent Algorithm and Calculation Research on Path Planning of AUV Based on Improved Ant Colony Algorithm ............................................121 Shaokun Yan Incremental Learning Algorithm Based on Graph Regularized Non-negative Matrix Factorization with Sparseness Constraints ................................................................................................................................125 Jintao Wang, Meng Zhang, Xusheng Hu, Tianwei Ni Elastic Network Regression Based on Differential Evolution Dragonfly Algorithm with T-Distribution Parameters ....................................................................................................................................................129 Jiayi Zhang, Wei Nai, Kairui Luo, Peiran Leng, Zan Yang, Dan Li, Chi Zhang Optimization and Integration of Logistics Facilities Resources Based on Genetic-Simulated Annealing Hybrid Algorithm .......................................................................................................................................................135 Qingran Ji, Fanchao Meng, Hongzhen Zheng, Dianhui Chu Optimization of Assembly Scheduling Based on an Improved Adaptive Genetic Algorithm ..........................143 Shanliang Xue, Liuyan Wu, Guangxin Chen, Sijia Cheng, Yong Yuan Modeling and Algorithm Research on Stowage of Emergency Rescue Vehicles on Ro-Ro Ship ..................149 HAN Can, LIU Qinhui, HAO Tong, XU Qiang, LIU Jingqiao, LI Qiangkun, SHI Han A Intrusion Detection Algorithm Based on Improved Slime Mould Algorithm and Weighted Extreme Learning Machine.........................................................................................................................................................157 Tang Xiong, Ge Lina, Zhang Guifen, Qin Donghong Locally Linear Embedding Based on Seagull Optimization Algorithm with T-distribution Parameters ...........162 Minhui Ye, Zan Yang, Hanwei Jiang, Shuhan Zhou, Wei Nai, Dan Li, Yidan Xing PID Parameter Optimization of Secondary Cooling Water Distribution Model for Continuous Casting Based on Improved Artificial Bee Colony Algorithm.......................................................................................................167 Yibing Wang, Xiangwei Kong, Peifeng Hao Improved Grey Wolf Optimization Algorithm for Solving Cloud Manufacturing Scheduling Problem with Limit Logistics Resource ........................................................................................................................................174 Xiaohui Li, Xueru Wang, Yi Zhao, Yuan Dong, Ping Wang An Adaptive Clustering Algorithm Based on Circular Units............................................................................179 Fang Wang, Yongqiang Xie, Zhihui Hu, Kai Zhang, Yunchao Zhang Traffic Anomaly Detection Algorithm Based on Improved Salp Swarm Optimal Density Peak Clustering .....187 Xin Li, Peng Yi, Yiming Jiang, Xiangyu Lu v
Highway Traffic Flow Prediction Based on Optimized KNN of Spark ............................................................192 Zhang Liping, Feng Yongxiang, Li Leixiao, Bai Xiaoman Chapter V: Computer Modeling and Mathematical Calculation A Method of Load Forecasting Based on Temporal Convolutional Network ..................................................198 Ganghong Zhang, Wenbin Chen, Chao Huo, Huifeng Bai, Jian Gao, Jinhong He, Shuaiying Ma, Tonglei Liu Dynamically Mixed Group Convolution to Lighten Convolution Operation ....................................................203 Hang Wei, Zulin Wang, Gengxin Hua Reachability Analysis of Linear Systems with Rational Eigenvalues .............................................................207 Xinyu Ge, Shiping Chen Incorporating Pre-trained Model into Neural Machine Translation .................................................................212 Tailai An, Jiaxing Song, Weidong Liu Zipf Matrix Factorization: Matrix Factorization with Matthew Effect Reduction ..............................................217 Hao Wang Self-Adaptive Word Segmentation Model in Military Domain Based on Conditional Random Field ..............221 Kexiang Guo, Hengjun Wang, Zhixu Bai, Yejie Xue A Novel Large Neighborhood Search for Solving Green Vehicle Routing Problem .......................................227 Xiaohui Li, Peifan Li, Yi Zhao, Yuan Dong, Ping Wang An Electromagnetic Situation Calculation Method Based on Edge Computing and Cloud Computing .........232 Zhe Li, Le Yang Tracing Asian Giant Hornet: From a Data-Driven Perspective ......................................................................237 Yuanyuan Deng, Linqing Zeng, Qi Fu, Haoxuan Li Complex-Valued Vectors for Word Representation .......................................................................................242 Guangcheng Liu, Yuexian Hou Chapter VI: Deep Learning and Recommendation System Applying Deep Learning to Autonomous Vehicles: A Survey .........................................................................247 Jing Ren, Hossam Gaber, Sk Sami Al Jabar Traffic Signal Control Based on Deep Reinforcement Learning with Simplified State and Reward Definitions ... ......................................................................................................................................................................253 Salah Bouktif, Abderraouf Cheniki, Ali Ouni, Hesham El-Sayed vi
Research on Bearing Fault Diagnosis Base on Deep Learning ....................................................................261 Weipeng Xu An Overview of Landslide Detection: Deep Learning and Machine Learning Approaches ............................265 Hong Zhang, Mingzhe Liu, Tao Wang, Xin Jiang, Bingqi Liu, Pengyu Dai Graph Neural Network Recommendation Model Based on Long- and Short-Term Interests ........................272 Qi Feng, Yuan Tan, Ming Zhou, Guangjun Zeng, Zhe Chen Multi-behavior Recommendation Based on Simplified Graph Convolutional Networks .................................277 Hongfei Yu, Xinhua E, Xiaoli Li, Kang Wang, Siyang Zhang A Model Hybrid Recommendation Approach Based on Knowledge Graph Convolution Networks ...............283 Zhen Hou, Tong Li, Huilin Fu, Qidong Liu, Zehui Zhang, Mengjie Hu Chapter VII: New Generation Neural Network and Technology Exponential Synchronization of Switched Inertial Reaction-Diffusion Neural Networks with Time Varying Delays via Intermittent Control ......................................................................................................................289 Jiefei Yan, Meng Hui, Jiahuang Zhang, Chen Wei, Ning Yao The Interpretability of Quantum-Inspired Neural Network .............................................................................294 Shikai Song, Yuexian Hou, Guangcheng Liu Multi Resolution Prediction Model Based on Wavelet Analysis and Neural Network .....................................299 Chengzhao Zhang, Heping Pan An Automatic Detection Method of Bird’s Nest on Electric Tower Based on Attention Full Convolutional Neural Networks .......................................................................................................................................................304 Wuzhong Dong, Lie Wu, Qi Wang, Sen Cheng Finite-Time Projective Synchronization of Stochastic Complex-Valued Neural Networks with Time Varying Delays ...........................................................................................................................................................309 Jiahuang Zhang, Meng Hui, Chen Wei, Jiefei Yan, Ning Yao Predicting Trend of High Frequency CSI 300 Index: Based on Empirical Mode Decomposition and BP Neural Network .........................................................................................................................................................315 Guangyan Gan, Xueyu Zhou, Haoxuan Li Few-shot Learning for Rolling Bearing Fault Diagnosis Based on Residual Convolutional Neural Network .320 Zihao Cui, Xiangwei Kong, Peifeng Hao Semi-supervised Text Classification Based On Graph Attention Neural Networks ........................................325 Jian Huang, Nana Tao,Hui Chen,Qingshan Deng,Wei Wang,Jing Wang vii
Semantic Analysis on Product Review Headlines Based on Review Association Mechanism and Convolutional Neural Network .............................................................................................................................................331 Yanghao Xiao, Xueyu Zhou, Haoxuan Li Chapter VIII: Sentiment Analysis and Classification A Novel Microblog Sentiment Classification Method Based on Top-k Pooling ...............................................335 Binyan Zhang, Xiaofei Zhu, Xianying Huang, Wanping Liu Sentiment Classification Algorithm of Danmaku Comment Based on Modified Bayes Model .......................342 Ziyi Wang, Guanying Huang Quantum-Inspired Model Based on Convolutional Neural Network for Sentiment Analysis ..........................347 Si Li, Yuexian Hou Live Comments Emotional Analysis based on EE-RNN ................................................................................352 Pengcheng Tan, Hongguang Xu, Ke Xu Sentiment Assessment of Brand Advertising on Gender Issues on Social Network: A Case Study of Femvertising on Sina Weibo in China ...........................................................................................................360 Yuan Chen, Zhisheng Zhang, Zhijie Xia PHARN: A Probabilistic Graph Model Based Hierarchical Affective Reasoning Network for Conversational Sentiment Analysis ........................................................................................................................................365 Peng Guo,Yuexian Hou,Xiujun Gong Aspect Extraction in Sentiment Analysis Based on Emotional Affect Using Supervised Approach ...............372 Jaafar Zubairu Maitama, Norisma Idris, Asad Abdi, Andrew Thomas Bimba Research on Semantic Sentiment Analysis Based on BiLSTM .....................................................................377 Chenyue Zhang,Lizhi Liu Chapter IX: Target Recognition Comparative Study on Different Dimension Reduction Methods in Remote Sensing Ground Object Recognition ...................................................................................................................................................382 Lei Kang, Xin Zhang, Kai Zhang, Biao Yuan Hyperspectral Object Recognition Based on Optimized Gabor Spatial-spectral Feature ..............................387 Quanwei Xu, Xiaoqing Hu, Kai Zhang, Biao Yuan An Application for Identification of Malignant Weeds in Cereal Fields Based on Neural Network .................392 Chao Zhang, Kai Fu, Zengguanqi Duan, Yansong Zhai, Ziping Tian, Jing Huang Railway Driver Behavior Recognition System Based on Deep Learning Algorithm .......................................398 Li He, Jie Zhang viii
Application of Active Learning in Carbonate Lithologic Identification .............................................................404 Biao Yuan, Zhongyuan Wu,Kai Zhang,Deqi Li,Qiaoyu Ma Research on Detection and Identification Technology of Intelligent Devices in Cyberspace: A Survey .........409 Le Yao, Honglin Zhuang, Zhechao Lin, Jiaxiang Gu, Fang Wang, Qinbo Chen Chapter X: Image Analysis and Methods Fusion Algorithm for Foggy Image Enhancement based on Transmittance Weight Factor ...........................419 Wei Sun, Meng Zhang, Jintao Wang An Image Defog Network Based on Multi-scale Feature Extraction and Weighting ......................................423 Chen Yu, Cai Qiong, Qianqian Huang, GuoQing Chen, Xingbao Fu Improved Genetic Algorithm Otsu for Power Transmission Line Foreign Body Image Segmentation ...........428 Zhou Hao, Zhang Hongmin,Li Shunyuan,Li Pingping Medical Records Classification Model Based on Text-Image Dual-Mode Fusion ..........................................432 Yang Chen, Xinyue Zhang, Tao Li Deep Learning Approach for Breast Ultrasound Image Segmentation ..........................................................437 Yahya Alzahrani, Boubakeur Boufama First-Order Meta-Learning in Node Classification with Graph Convolutional Network ..................................443 Jing Cao, Yi Xu, Xuening Song New Mechanism of Visual Motion Direction Detection Based on McCulloch-Pitts Neuron Model .................448 Yi Chen, Zheng Tang, Hiroyoshi Todo PO-SLAM: A Novel Monocular Visual SLAM with Points and Objects...........................................................454 Xiaohan Li, Shiqi Lin, Meng Xu, Deyun Dai, Jikai Wang A Neuron for Velocity Detection Based on Inhibitory Mechanism in Retina Ganglion ...................................459 Mianzhe Han, Yuki Todo, Zheng Tang Chapter XI: Computer Graphics and Photography Technology Investigating the Efficiency of a Three-Dimensional Facial Tracker Using Stereo Camera Arrangements ....463 Faleh AlQahtani, Jasmine Banks, Vinod Chandran, Jinglan Zhang Feature Extraction of Hyperspectral Image Structure Based on Spatial-Spectral Fusion..............................469 Shutao Zhang, Xin Zhang, Kai Zhang, Biao Yuan Channel Attention Residual Network for diagnosing Pneumonia ..................................................................474 Zhaoxia Guo, Jianjun Zhang, Yiming Zuo, Peishun Liu, Ruichun Tang, Xiaoxia Li ix
Fast Welding Defect Inspection on Digital Radiography Images Using Saliency Detection ..........................480 Yi Zhao, Pu Zhao, XiaoHui Li, JinPing Zhai Multi-transformation Consistency Regularization for Semi-supervised Medical Image Segmentation ..........485 Yi Zhang, Bin Zhou, Lei Chen, Yulin Wu, Hongchao Zhou An End-to-End Practice of Remote Sensing Object Detection with NVIDIA Embedded System ...................490 Jingyao Huang, Hao Su, Xun Liu, Wei Li, Yi Cai, Lingxue Wang Visual Saliency Prediction of Global Attention Based on Relevance Perception ...........................................495 Chenzhou Deng, Xiangyang Chen, Cao Qianqian Multi-classification of fNIRS Signals in Four body parts Motor Imagery Tasks Measured From Motor Cortex .... ......................................................................................................................................................................500 Yuan Li, Hui Shen, Yang Yu, Dewen Hu Chapter XII: Advanced Information Theory and Technology An Interpretable Regularization Method Based on Minimizing Mutual Information .......................................505 Nan Xie, Yuexian Hou A VCT Discovery Algorithm of Renju .............................................................................................................510 Zhikun Zhao, Fan Zhang, Quansheng Wu, Yuan Zhang Analysis of Microblog User Influence Based on Multivariate Interaction Counting Framework Model ..........515 Zhikai Wang, Xuemin Zi CRW-NER: Exploiting Multiple Embeddings for Chinese Named Entity Recognition ....................................520 Aiguo Chen, Chenglong Yin Enhancing Collaborative Filtering Recommendation by User Interest Probability .........................................525 Jing Yu, Jingjing Shi, Yunwen Chen, Wenhai Liu, Kai Liu, Zhijun Xie SAFS: Social-Article Features-Stacking Model for Fake News Detection .....................................................530 Xiaojun Wu, Jimin Wang Micro-course Evaluation Index System based on User Experience ..............................................................536 Yu Sun, Dongmei Yang, Yaowen Xia Studying the Fuzzy Clustering Methods to Understand Employee Performance ..........................................541 Quang-Vinh Dang, Minh-Tuan Truong, Minh-Hoang Huynh Rounding Shift Channel Post-Training Quantization using Layer Search .....................................................545 Mengmeng Xu, Mingxin Zhao, Shuangming Yu, Xuemin Zheng, Nanjian Wu, Liyuan Liu HyperEA: Hyperbolic Entity Alignment between Knowledge Graphs ............................................................550 Shuai Gao x
Research on Named Entity Recognition Technology of Knowledge Graph for Flipped Classroom ...............555 Yifeng Li, Yuan Tan, Ming Zhou, Guangjun Zeng, Zhe Chen Chapter XIII: Information Network and Application Technology A Deep Intrusion Detection System in Lambda Architecture Based on Edge Cloud Computing for IoT ........561 Rubayyi Alghamdi, Martine Bellaiche A Double Stream Module in Backbone for Object Detection Network ...........................................................567 Xuanfang He, Yan Ding, Yating Yuan, Weidong Liang, Xinliang Huang, Jiayuan Shan Encrypted Traffic Classification Based on Traffic Reconstruction ..................................................................572 Qianli Ma, Wei Huang, Yanliang Jin, Jianhua Mao Research on System Log Anomaly Detection Combining Two-way Slice GRU and GA-Attention Mechanism ......................................................................................................................................................................577 Shijing Gu, Yuchun Chu, Wenbin Zhang, Peishun Liu, Qilin Yin, Qi Li Chapter XIV: Information Engineering and Information Management Movement Stimulation through Social Media: The Tweeted Perspective and Road Safety Movement in Bangladesh ...................................................................................................................................................584 Afsana Begum, Md. Alamgir Hossain, A.U. M. Tuhin, Md. Fakrul Abedin Bhuiyan Removal of Rain Streaks in Air Using GAN ...................................................................................................589 Pin Cao, Jie Zhang, Peng Zou, Donglin Li, Wuchang Li, Chengli Zhong, Lei Ma, He Cui Network Characteristics and Risk Analysis of Logistics Sharing Economy ...................................................594 Ming Dai, Runjie Xu, Jian Du, Yuchang Liu, Hongwei Xing Lithology Classification System for Well Logging Based on Bidirectional Gated Recurrent Unit ...................599 Rui Zhou, Xiaoqing Hu, Biao Yuan, Quanwei Xu Hierarchical Cost-Sensitive Techniques for Class Imbalance Learning .........................................................604 Huan Xu Research on Interval Estimation of Trip Fuel Consumption Based on Irregularly Distributed Samples .........610 Guodong Liang, Jingjie Chen, Jiaxue Liu Research on the Interaction Design of Mobile APP for Second-hand Luxury Goods Transaction .................617 Wen Qi, Pengpeng Yang Shear Wave Velocity Prediction of Carbonate Reservoirs Based on CatBoost .............................................622 Chengcheng Zhong, Fengjie Geng, Xin Zhang, Zitong Zhang, Zhongyuan Wu, Yanan Jiang xi
Chapter XV: Artificial Intelligence and Application Blockchain-Based Infrastructure for Artificial Intelligence with Quantum Resistant .......................................627 Bo Yuan, Faguo Wu, Wangjie Qiu, Wendi Wang, Hong Zhu, Dongxu Zhou Robot Mapping and Navigation System Based on Multi-sensor Fusion ........................................................632 Bo Zhang, Jie Zhang Research on VSLAM of UAV in Coal Mine Based on ROS ...........................................................................637 Minghui Zhao, Qijun Chen, Shihong Zhang Intelligent Control System of Coal Mine Main Transportation Based on Machine Vision...............................641 Yongqing Lv, Ning Liu, Cungen Xi, Minghui Zhao Research and Exploration of Land Use in Core Area of Urban Central Rail Transit Station Based on AI Technology ....................................................................................................................................................645 Yuan He, Hong Yuan, Qiang Yao, Zelin Wang Chapter XVI: Computer and Electrical Engineering A Method of Equipment Safety Certification Based on Daily Cycle Activity ...................................................651 Nan Ye, Chenhao Sun, Runjie Xu, Fangling Sun Study on Common Factors Identification of Aerospace Quality Problems Based on Similarity .....................659 Fengsheng JIA, Yuming WANG, Jiaqi YOU Design of Electronic Device Life Test Monitoring System Based on Optical Character Recognition Technology ......................................................................................................................................................................665 Jiawei JI, He LV CrossNet: Computing-Friendly Lightweight Anchor-Free Detector ................................................................670 Yuncong Yao, Qiang Wang, Jiren Mai,Wankou Yang Modeling and Simulation of Wide Area Backup Protection System Based on UPPAA ..................................676 Xiong Haijun, Ye Xinyu, Jiang He, Wang Yao Window-Based Dynamic Streaming Tensor Analysis Based on CP Decomposition......................................681 Xuemei Zhong, Junhua Chen, Lei Zhang, Yan Zhang A Multi-objective Task-Driven Vehicle Routing Problem with Recirculating Delivery and its Solution Approaches ...................................................................................................................................................687 Lei Wang, Fanchao Meng, Xiaochuan Min, Dianhui Chu xii
You can also read