Loading [MathJax]/extensions/MathZoom.js
2022 IEEE 5th International Conference on Information Systems and Computer Aided Education (ICISCAE) - Conference Table of Contents | IEEE Xplore
International Conference on Information Systems and Computer Aided Education (ICISCAE)

2022 IEEE 5th International Conference on Information Systems and Computer Aided Education (ICISCAE)

DOI: 10.1109/ICISCAE55891.2022

23-25 Sept. 2022

Proceedings

The proceedings of this conference will be available for purchase through Curran Associates.

Information Systems and Computer Aided Education (ICISCAE), 2022 IEEE 5th International Conference on

Table of Contents

Publication Year: 2022,Page(s):1 - 11
Aiming at the complex problem of parameter tuning of fractional order PID controller, an improved sparrow search algorithm(ISSA) is proposed for parameter tuning. The elite reverse learning is used to initialize the population and improve the iterative process. At the same time, the random walk mechanism is introduced and the conversion probability P is set so that they can be executed alternately...Show More
Fault diagnosis technology is critical to the reliability of DC-DC power modules. Large amount of studies on DC-DC power modules take out its internal components for testing and analysis, then study corresponding testing methods. A fault diagnosis method which is based on wavelet packet decomposition (WPD) and BP neural network is presented in this paper. The circuit fault data is obtained by Mont...Show More
This paper deals with lossy compression of grayscale and color images. A traditional assumption for any compression technique and any image is that a higher compression ratio leads to worse quality of any compressed image according to any quality metric, either standard one as MSE or PSNR or a visual quality metric. Meanwhile, it has been discovered recently that there are grayscale images (called...Show More
For the current stage of PV power output instability and power generation prediction model problems, the short-term PV power prediction method based on the optimization of long and short memory neural networks is studied. By analyzing the distribution characteristics of neural networks, the initial data are substituted into the data optimization model, the target weights are calculated continuousl...Show More
It is especially important for us to detect heart rate due to the relatively high incidence of coronary heart disease in China. Detecting body temperature during Covid-19 is essential. Older heart rate and temperature detectors are commonly used in hospitals due to their high cost of construction. Therefore, it is of great practical importance to design a small heart rate and temperature detection...Show More
Aiming at the problems of color distortion, detail loss and low contrast of underwater images, an underwater image enhancement method combining detail enhancement and exposure fusion is proposed. Firstly, the color balance algorithm of RGB three-channel histogram quantization is used to balance image color and improve contrast. Secondly, images with different exposure degrees are obtained by adjus...Show More
In order to make the air traffic control system operate safely and nip in the bud, according to the fuzzy matter element analysis theory, a model of air traffic control system based on comprehensive weighting is using the security assessment index system the of millitary air traffic control. In this model we use Minimum Discrimination Information principle to make the weights obtained by the analy...Show More
Improving the perception of objects for an image through label co-occurrence correlation is shown to improve the hash quality. Existing methods ignore the relationship between different representation regions and lack highlighting of salient features when fusing co-occurrence label vectors with image embeddings. To tackle this issue, we proposed a new fusion scheme, i.e., Multi-mapping Multi-modal...Show More
Most existing class incremental learning methods employ data storage or extended network structures, but they cannot effectively alleviate the catastrophic forgetting problem due to memory resource limitation. To solve this issue, a brain-inspired generative replay model is proposed in this work. First, VAE-ACGAN is used to simulate the memory self-organizing system to improve the quality of the g...Show More
The epidemic prevention robot designed in this paper uses the STM32F103C8T6 minimum system as the main control chip, uses K210 as the face mask recognition module, and is composed of a voice broadcast module, an LCD liquid crystal screen, and an infrared temperature measurement module. When the system detects that the face is not wearing a mask or is not wearing a mask correctly orthe human body t...Show More
Robotics is an important achievement in the field of intelligence. The mobile robot is more widely used than the fixed robot, has a very heavy role and status. Two important technologies of mobile robot autonomous mobile system include map construction and path planning. Map construction and path planning can ensure that the robot is in an unfamiliar environment, and use sensors to achieve localiz...Show More
Aiming at the autonomous maneuver decision-making problem of UAV air combat, a lateral maneuver decision-making algorithm is designed. By adding heuristic factors and double Q-table alternating learning mechanism, the defects of slow learning speed and more ineffective learning in traditional Q-learning algorithm are improved. Through the comparison of path planning simulation and data, it is veri...Show More
A dynamic grid planning environment is designed, which can make the UAV adaptively adjust the grid size according to the changing air combat situation, and has no impact on the solution rate. Based on the Q-learning algorithm, the lateral maneuver decision-making model of UAV air combat is constructed, and it is verified that the improved Q-learning algorithm can play a significant role in improvi...Show More
To improve the judging and decision-making ability on air target threats in air defense operations, an air target threat assessment method is proposed based on Relevance Vector Machine (RVM) and Artificial Bee Colony (ABC) algorithm. From the reality of air defense operations, the air target threat index system is firstly constructed according to mathematical statistical analysis, and then ABC alg...Show More
loT devices have provided great convenience for people's life and work, but hacking risks often tag along with this. Once attacked, a large amount of privacy information will be leaked and security problems will be triggered. Therefore, it is necessary to analyze and strengthen the security of loT devices. This paper proposed an loT devices identification method based on multilayer perceptron, whi...Show More
Parents have different attitudes towards the application of online education. This paper is based on a real teaching scenario of a famous English online education application. A large number of students are invited to become trial users. After a period of time, users registered as official users are marked as active users, and vice versa, as lost users. This paper collects the characteristic attri...Show More
Serial communication is widely used as a transmission method of sensor data. In the meantime, so as to obtain more and more reliable sensor data, this paper proposes an embedded system solution based on DSP and FPGA. It mainly builds a multi-serial monitoring system to complete the hardware design and software design of this system through TI's DSP and Xilinx's FPGA. This system hardware consists ...Show More
Digitalization is an important trend in the development of printing industry. Digital die cutting is the key post press process of digital printing, and its registration accuracy directly affects the product quality. Based on the analysis of the positioning principle of die-cutting machine, this paper presents a registration algorithm for detecting the paper deviation and skew of die-cutting machi...Show More
The data characteristics of the information cascade are essential to the prediction performance of the information cascade. The traditional prediction methods can not well couple the various attributes of cascade data. This paper proposes an approach based on deep extraction of full spatiotemporal structure (FuSTCas). FuSTCas uses the deep learning framework to extract and refine the spatiotempora...Show More
This paper examines the containment control issue over the network of second-order agents, among which the diverse communication delays are allowed between any two adjacent agents under the sampled-data setting. A local control scheme taking into account the communication delays is first presented and adopted. Then, by establishing the inequality in terms of gain parameters and sampling period, th...Show More
At present, with the iteration of existing technologies, the importance of blockchain is constantly being recognized by people, and cross-chain technology is also becoming more and more important with the development of blockchain. Existing cross-chain solutions often have various problems and challenges. Given the challenges faced by the existing cross-chain solutions, this paper proposes a cross...Show More

Image Forgery Detection Using Deep Learning Framework

Yuchao Deng

Publication Year: 2022,Page(s):105 - 108
Cited by: Papers (1)
With the continuous development of digital media and the rapid change of digital image processing equipment, digital images are easy to be tampered with by criminals. In recent years, illegal elements often use tampering images to commit crimes, so it is urgent to study image forensics technology. Blind forensics technology is used to verify the original and authenticity of the image, and then the...Show More
Image tampering has brought a great negative impact on society. People who do not know the truth are easy to be misled and used by people with intentions. Its impact on society has attracted extensive attention of Chinese and foreign researchers. With the development of image editing technology, image tampering detection has made remarkable achievements from the initial naked eye recognition to ma...Show More
In the information age, schools want to develop better, they must pay more attention to multiaspect's evaluations and opinions, and the campus network platform is a good medium. We can get teachers, students and societies for the school's more real evaluation. In order to better analyze the emotional polarity of various groups for some aspect of the school, we need to build a model to analyze the ...Show More

Proceedings

The proceedings of this conference will be available for purchase through Curran Associates.

Information Systems and Computer Aided Education (ICISCAE), 2022 IEEE 5th International Conference on