Export Citations
No abstract available.
Proceeding Downloads
Blockchain Technology as A Guarantee of Transparency in The Supply Chain of Commercial Enterprises
Traceability has become an essential element of supply chain management, especially in safety-sensitive sectors such as food, pharmaceuticals, etc. Upstream (manufacturers, producers, etc.) and downstream (distributors, wholesalers, etc.) supply chain ...
Trusted blockchain of ring signature in TEE environment
Traditional blockchain system has two problems: poor privacy protection and scalability. The public chain discloses all information, which can be seen by every node. The code of smart contract is clear-text, and the data is also clear-text. Every node ...
Maintain the Persistence of a Distributed Ledger for Future Generations
Blockchain or distributed ledger technology (DLT) guarantees revision safety of transaction logs independent from usage scenarios. Thus, trust is ensured by DLT in a long-term perspective. Hence, one can pose the question, whether DLT is an attractive ...
The Mechanism of Blockchain Technology Influencing Management Accounting
Blockchain technology is reconstructing and optimizing the management mode and transaction mode of enterprises. As an important part of the management mode and transaction mode of enterprises, management accounting is increasingly being reshaped by ...
Research on the Application of Blockchain Technology in Education and Teaching in Higher Vocational Colleges
With the progress and development of science and technology, blockchain technology has shown great influence in many fields. Blockchain technology has been widely used in various fields of society, and the integrated development of higher vocational ...
Image splicing tamper detection based on two-channel dilated convolution
Image splicing tampering detection can provide technical support for the identification of authenticity and integrity of images in various fields by using specific methods to quickly detect whether tampering has occurred in images. Most of the existing ...
A two-stage spatial pose detection method for bearing rings based on YOLOv5 and binocular vision
The bearing ring has the characteristics of weak texture and high reflection, which easily cause errors in stereo vision matching. To address these issues, this paper proposes a two-stage spatial pose detection method for bearing rings based on YOLOv5 ...
Secret Message CDMA Multiplexing via QR Codes
In this paper, we propose an innovative secret message multiplexing scheme for QR code based on the technology of Code Division Multiple Access (CDMA). Multiple secret messages distributed for several participants are encoded into a CDMA codeword ...
Artificial intelligence technology enables the development of management accounting: The generation of Intelligent Accounting
Starting from the concepts of artificial intelligence and management accounting, this paper analyzes the application of artificial intelligence technology in management accounting, expounds the past and present life of intelligent accounting, and ...
Attribute-based encryption with outsourced computation for access control in IoTs
There are many terminal devices with constrained computing resources in the IoT environment. The traditional lightweight attribute-based encryption schemes adopt third-party outsourcing computing to meet the lightweight access control requirements of ...
The Research on Real-time Security Situation Assessment Technology Based on the Threat Propagation Model
Network security situation assessment is a research hotspot in the field of information security, which is strong in real-time performance. However, most of the current real-time situation assessment technologies are very complicated and do poorly in ...
Research on Food Safety Data Sharing and Exchange Mechanism
With the development of the economy and the improvement of people's quality of life, the public demand for food taste has gradually changed to the demand for food safety. In order to better facilitate the government to strengthen food safety supervision ...
Cluster Analysis for Customer Segmentation with Open Banking Data
Segmenting customers into different groups using their characteristics and behaviors has always been an important topic. Customer segmentation can lead to better customer understanding and targeting, which in turn leads to more effective product ...
KL Divergence Adaptive Weight Combination Multi-Classifier Emotion Recognition Method Fused with Bimodality
There is the problem that single modal and single classifier emotion recognition rate is not high and robustness is not strong. In this paper, the text and speech easily available dual modalities were combined, and the combined multi-classifier strategy ...
A Binding Bigraphical Model of Context-Aware Adaptive Systems
Many context-aware adaptive applications (CAAAs) change their behaviors according to the user-configured adaptation rules at runtime, however, some of these rules result in inconsistence with the specifications of the CAAAs unfortunately. By employing ...
Infusing Biomedical Knowledge into BERT for Chinese Biomedical NLP Tasks with Adversarial Training
Biomedical text mining is becoming increasingly important. Recently, biomedical pre-trained language models such as BioBERT and SciBERT, which can capture biomedical knowledge from text, have achieved promising results in biomedical NLP tasks. However, ...
The Composable Finance Mosaic Bridge and Liquidity Forecasting
We introduce the forecasting technology behind Composable Finance's (Composable's)1 cross-layer cross-chain bridge Mosaic2 . Mosaic contains a network of vaults, one on each layer and chain, and we present our research into improving the operation and ...
A Combination Model Based Deep Long Term Model for Tourism Demand Forecasting
The accurate tourism demand forecasting is crucial to the development of tourism. However, the challenge of non-linear features recognizing in tourism time series makes it a troublesome thing. To overcome the above difficulties, this paper proposes a ...
A Multi-Attribute Group Decision Making Method for Express Supplier Selection Based on Generalized Fuzzy Soft Set
At present, the express industry is developing rapidly and a variety of express companies emerge in endlessly. On this basis, the selection of express suppliers is particularly important. In this paper, a multi-attribute group decision making (MAGDM) ...
TANDOORI: A Passive Customer-Centric and Truly End-to-End Approach using e-KYC and Location-based Positioning for Logistics Services
Logistics chain customers, including senders and recipients, today suffer from being unable to track their delivery status. In fact, the delivery status has never been truly end-to-end; recipients are not aware of when senders will send a parcel to them ...
A Systematic Approach for Mining Quality of Services: A methodology and a case study
Web services are used to provide different software functionalities to Web service users. Web services can be further classified according to their quality. Mining and visualizing quality attributes could help Web service selectors to find the ...
The Analysis of Commercial Pattern of Cloud Computing Platform
For solving the problem which there have not suitable commercial pattern of cloud computing platform yet, a commercial pattern of cloud computing platform was proposed and constructed. The solving scheme are provided as follows. After explicitly demand ...
Research on Geometric Brownian motion and its practice in pricing
In this paper, the authors represent two main parts about stochastic process. In the first part, the authors discuss Brownian motion and point out limitation in classic calculus of Brownian motion. In order to solve the limitation, authors introduce Ito ...
Research on Fault Diagnosis Based on Spiking Neural Networks in Deep Space Environment
Deep space detection technology is one of the development directions in the aerospace field today. The long-distance, high cost, high uncertainty, and severe resource limitations of deep space detection missions determine that deep space detectors need ...
Implementation of Cloud- And Android-Based Indoor Illuminance Collection, Transmission and Visualization
Efficient Information Management of Building Light Environment can help create more comfortable and intelligent indoor light environment. This paper aims to develop a Cloud- and Android-based indoor illuminance information system (I3S) framework, ...
GRIN: Make Rewriting More Precise
In computer security, many systems and applications depend on binary rewriting techniques when source code is absent, including binary instrumentation, profiling and security policy reinforcement. While the rewriting technique is continuously evolving, ...
Research on Integration Scheme of DC Microgrid System and DC Power Supply System for Intelligence Energy Source Station
This paper studies the change of DC power system architecture after the construction of AC / DC microgrid system in 220kV intelligent energy source station, analyzes the possible problems after the integration of DC microgrid system and station DC power ...
A Task-Parallel and Reconfigurable FPGA-Based Hardware Implementation of Extreme Learning Machine
Extreme learning machine (ELM) is an emerging machine learning algorithm and widely used in various real-world applications due to its extremely fast training speed, good generalization and universal approximation capability. In order to further explore ...
Index Terms
- 2022 3rd Asia Service Sciences and Software Engineering Conference