2019 IEEE 4th Advanced Information Technology, Electronic and Automation Control Conference (IAEAC)最新文献

筛选
英文 中文
Research on intelligent decision support system of ship’s hull plates curved forming by line heating 船舶船体板线加热弯曲成形智能决策支持系统研究
Liang Qi, Wei Wang, Liang Dong, Liankai Chen, Chenwei Ge, Jing Huang, Ganmin Xue, Xuan Jia
{"title":"Research on intelligent decision support system of ship’s hull plates curved forming by line heating","authors":"Liang Qi, Wei Wang, Liang Dong, Liankai Chen, Chenwei Ge, Jing Huang, Ganmin Xue, Xuan Jia","doi":"10.1109/IAEAC47372.2019.8997638","DOIUrl":"https://doi.org/10.1109/IAEAC47372.2019.8997638","url":null,"abstract":"In the process of curved forming for ship’s hull plates, one of the main parameters is to determine the position of the flame path . By research on the theory for curved forming of ship’s surface, the comprehensive database of hull plate surface deformation is established, and the prediction algorithm of hull plate process parameters is put forward by combining the optimization of plate unfolding method and ACA, and the corresponding prediction system of process parameters is developed.","PeriodicalId":164163,"journal":{"name":"2019 IEEE 4th Advanced Information Technology, Electronic and Automation Control Conference (IAEAC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123515930","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Advanced Density Peak and K-means Clustering on Image Segmentation 基于密度峰值和k均值聚类的图像分割
Yu Hui, Yanju Han
{"title":"Advanced Density Peak and K-means Clustering on Image Segmentation","authors":"Yu Hui, Yanju Han","doi":"10.1109/IAEAC47372.2019.8997758","DOIUrl":"https://doi.org/10.1109/IAEAC47372.2019.8997758","url":null,"abstract":"K-means is a classical and widely-used data clustering algorithm. Despite its effectiveness, the drawbacks are obvious that it needs to know k value previously and not suitable for complex situations. Density Peak clustering can practice on irregular data sets with a higher accuracy and better performance than K-means and doesn’t need to get prior knowledge. However, few concentrated on their performances on image segmentation. In this paper, we propose novel image segmentation approaches based on K-means and Density Peak clustering which greatly reduce running time. Compared with current methods, our methods have improved aspects as following: 1) The methods could have much shorter run time performance than other current normal methods. 2) Unlike other current image segmentation methods, our method could save the original colors of the pictures and provide a rather real image segments. Experiments on test data will testify the validity of the methods and a detailed description based on empirical results will be provided as conclusions.","PeriodicalId":164163,"journal":{"name":"2019 IEEE 4th Advanced Information Technology, Electronic and Automation Control Conference (IAEAC)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121921612","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Design of Remote Meter Monitoring System Based on MCU Control 基于单片机控制的远程仪表监控系统设计
Zhaoxing Meng, Ying Zhu, Haiqiang Lv, Xinjian Xu
{"title":"Design of Remote Meter Monitoring System Based on MCU Control","authors":"Zhaoxing Meng, Ying Zhu, Haiqiang Lv, Xinjian Xu","doi":"10.1109/IAEAC47372.2019.8997889","DOIUrl":"https://doi.org/10.1109/IAEAC47372.2019.8997889","url":null,"abstract":"According to the requirements of meter reading in the station area, the design principle and remote communication scheme of the system are established, and the overall design scheme of the system is established. In view of the shortcomings of GSM communication, GPRS data communication scheme is adopted. According to the working principle of the system, the data acquisition, digital-analog conversion and data transmission processes are analyzed and studied, which improves the data transmission capability of the system. In the hardware design of the system, the main controller adopts AT89C51 8-bit MCU, serial communication includes RS-232, RS-485 and various communication interfaces. The design of sampling circuit combines filter circuit and phase-locked loop circuit, which effectively improves the accuracy of data acquisition and anti-interference ability.","PeriodicalId":164163,"journal":{"name":"2019 IEEE 4th Advanced Information Technology, Electronic and Automation Control Conference (IAEAC)","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122172382","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Restore the Original data by Embedded data 通过嵌入数据恢复原始数据
Jianyuan Cui, Gang Li, P. Zhou, Jia Qi Zhang
{"title":"Restore the Original data by Embedded data","authors":"Jianyuan Cui, Gang Li, P. Zhou, Jia Qi Zhang","doi":"10.1109/IAEAC47372.2019.8997598","DOIUrl":"https://doi.org/10.1109/IAEAC47372.2019.8997598","url":null,"abstract":"Network is an important representation method to describe related objects. For network, the most core research is to reasonably represent the characteristic information of nodes in the network, which is called network representation learning. In recent years, many scholars have proposed many excellent representation learning algorithms, through which the original network data can be embedded in low-dimensional representation, which can help us classify the nodes in the network, and the nodes can also be used as point coordinates in Euclidean space for visualization. Existing algorithms are all aimed at embedding the original data, but how to use the embedded data to restore the original data when the original data is incomplete has not been studied by scholars. In order to solve this problem, this paper proposes two solutions of deep learning, one is the artificial neural network method based on deep learning, and the other is the attention mechanism method based on deep learning. The experimental results of this paper show that these two methods are very effective.","PeriodicalId":164163,"journal":{"name":"2019 IEEE 4th Advanced Information Technology, Electronic and Automation Control Conference (IAEAC)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124608649","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on Digital Forensics Framework for Malicious Behavior in Cloud 云环境下恶意行为的数字取证框架研究
Guangxuan Chen, Di Wu, Guangxiao Chen, Panke Qin, Lei Zhang, Qiang Liu
{"title":"Research on Digital Forensics Framework for Malicious Behavior in Cloud","authors":"Guangxuan Chen, Di Wu, Guangxiao Chen, Panke Qin, Lei Zhang, Qiang Liu","doi":"10.1109/IAEAC47372.2019.8997702","DOIUrl":"https://doi.org/10.1109/IAEAC47372.2019.8997702","url":null,"abstract":"The difficult of detecting, response, tracing the malicious behavior in cloud has brought great challenges to the law enforcement in combating cybercrimes. This paper presents a malicious behavior oriented framework of detection, emergency response, traceability, and digital forensics in cloud environment. A cloud-based malicious behavior detection mechanism based on SDN is constructed, which implements full-traffic flow detection technology and malicious virtual machine detection based on memory analysis. The emergency response and traceability module can clarify the types of the malicious behavior and the impacts of the events, and locate the source of the event. The key nodes and paths of the infection topology or propagation path of the malicious behavior will be located security measure will be dispatched timely. The proposed IaaS service based forensics module realized the virtualization facility memory evidence extraction and analysis techniques, which can solve volatile data loss problems that often happened in traditional forensic methods.","PeriodicalId":164163,"journal":{"name":"2019 IEEE 4th Advanced Information Technology, Electronic and Automation Control Conference (IAEAC)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124779361","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Design Puncturing Polar Codes : The Odd-numbered Criterion 设计穿刺极性码:奇数准则
Rujing Xiong, Honggui Deng, Hao-hao Zhao, Yuxin Feng
{"title":"Design Puncturing Polar Codes : The Odd-numbered Criterion","authors":"Rujing Xiong, Honggui Deng, Hao-hao Zhao, Yuxin Feng","doi":"10.1109/IAEAC47372.2019.8997843","DOIUrl":"https://doi.org/10.1109/IAEAC47372.2019.8997843","url":null,"abstract":"We propose the odd-numbered criterion to design puncturing polar codes and a new puncturing algorithm was put out in this paper. In view of the unreasonable puncturing selection standards, unsatisfactory decoding performance and high computational complexity of the current algorithms, we do many analysis and comparison and find some rules, then we present the odd-numbered criterion, analyzing its’ reliability and effectiveness. According to it we design a new algorithm based on correlation coefficient we defined, and the results manifest that the algorithm can greatly improve the decoding error rate performance of the polar code while reducing the computational complexity, it can bring great benefits to the application of the polar code in the digital communication system significantly.","PeriodicalId":164163,"journal":{"name":"2019 IEEE 4th Advanced Information Technology, Electronic and Automation Control Conference (IAEAC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129808933","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Pedestrian detection method based on self-learning 基于自学习的行人检测方法
Tong Liu, Jianghua Cheng, Mingsheng Yang, Xiangyu Du, Xiaobing Luo, Liang Zhang
{"title":"Pedestrian detection method based on self-learning","authors":"Tong Liu, Jianghua Cheng, Mingsheng Yang, Xiangyu Du, Xiaobing Luo, Liang Zhang","doi":"10.1109/IAEAC47372.2019.8997629","DOIUrl":"https://doi.org/10.1109/IAEAC47372.2019.8997629","url":null,"abstract":"Vision-based pedestrian detection technology is widely used in security surveillance, such as transportation, prisons, and important places. Security monitoring requires pedestrian detection not only to be accurate and reliable, but also to meet the needs of real-time monitoring, and the false alarm rate is low. The existing pedestrian learning method based on deep learning has high reliability, but the timeliness cannot meet the monitoring requirements. Traditional pedestrian detection methods are time-sensitive, but false alarm rates tend to be higher. This paper proposes a self-learning pedestrian detection method, combined with motion detection, HOG feature extraction, and SVM classification for preliminary pedestrian detection. The false alarms caused during the pedestrian detection process are manually confirmed, and then the system automatically detects the false alarm image at a specific time. Self-learning, retraining the classifier, so as to continuously reduce the pedestrian detection false alarm rate and improve the pedestrian detection performance index through self-learning during the system operation, and the timeliness can meet the needs of video surveillance. Experiments show that the false alarm rate of this method is low, timeliness is high, and the recognition rate is also high.","PeriodicalId":164163,"journal":{"name":"2019 IEEE 4th Advanced Information Technology, Electronic and Automation Control Conference (IAEAC)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128495889","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Comprehensive Diagnosis and Analysis of Early Damp Defects On a Single Section of EHV 750kV Arrester 超高压750kV避雷器单段早期阻尼缺陷综合诊断与分析
Yunxiao Bai, Libing Zhou, Huiting Yang, Wenhua Luo, Wentao Chen, Longxiang Yuan
{"title":"Comprehensive Diagnosis and Analysis of Early Damp Defects On a Single Section of EHV 750kV Arrester","authors":"Yunxiao Bai, Libing Zhou, Huiting Yang, Wenhua Luo, Wentao Chen, Longxiang Yuan","doi":"10.1109/IAEAC47372.2019.8997821","DOIUrl":"https://doi.org/10.1109/IAEAC47372.2019.8997821","url":null,"abstract":"With the extention of the arrester’s running time, there appears the situation that a single section of extrahigh voltage 750kV four series surge arrester may get damp and deteriorated.Once subjected to over-voltage intrusion, a serious situation may even lead to a single section of arrester’s explosion, which will bring a very negative impact to the system over-voltage protection.Through the on-line monitoring of the arrester, it is found that the leakage current of an ultrahigh voltage 750kV arrester became over-limited, we carried out full current and resistive current live detection for the whole arrester and blackout test for single section.We analyzed the data and disintegrated the single section. It is concluded that, for the extrahigh voltage 750kV four series surge arrester, especially for early hidden defects, in terms of live detection, it should be effective to combine the on-line monitoring of arrester, live detection, we should pay attention to data accumulation and development trend.In terms of blackout test, DC leakage test is still the most reliable way to diagnose the arrester defect. Therefore, we should strengthen the on-line monitoring and charge detection data accumulation,and also focus on the development trend and combine with the blackout plan to carry out the DC leakage test actively. In this way we can detect early latent fault of single-stage arrester in time, and provide over-voltage protection correctly.","PeriodicalId":164163,"journal":{"name":"2019 IEEE 4th Advanced Information Technology, Electronic and Automation Control Conference (IAEAC)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129829338","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An incremental Bayesian network structure learning algorithm based on local updating strategy 一种基于局部更新策略的增量贝叶斯网络结构学习算法
Dan Liu, Jie Wu, Lin Liang, Xiaowan Li, Chunguang Luo, Guanghua Xu
{"title":"An incremental Bayesian network structure learning algorithm based on local updating strategy","authors":"Dan Liu, Jie Wu, Lin Liang, Xiaowan Li, Chunguang Luo, Guanghua Xu","doi":"10.1109/IAEAC47372.2019.8997724","DOIUrl":"https://doi.org/10.1109/IAEAC47372.2019.8997724","url":null,"abstract":"Bayesian network is wildly applied in AI field, but current structure learning algorithms consume a significant amount of time when faced with big data. We propose an incremental algorithm based on local updating strategy. First, we adopted a balanced decomposition for the structure, found the sub-network needed to be updated, and updated it to obtain the new network. Then we did simulation experiments to verify the validity of our method. Finally, we compared the efficiency and accuracy of our method with that of other mainstream algorithms. The result shows that our method runs in a low constant time, and its average accuracy of structure learning reaches 98%.","PeriodicalId":164163,"journal":{"name":"2019 IEEE 4th Advanced Information Technology, Electronic and Automation Control Conference (IAEAC)","volume":"94 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127319868","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Topology Optimization of Complex Network based on NSGA-II 基于NSGA-II的复杂网络拓扑优化
Zhang Bin, Gan Zhi-chun, Chen-Hsing Wen, Hu Qiang-qiang, Hou Jian-feng
{"title":"Topology Optimization of Complex Network based on NSGA-II","authors":"Zhang Bin, Gan Zhi-chun, Chen-Hsing Wen, Hu Qiang-qiang, Hou Jian-feng","doi":"10.1109/IAEAC47372.2019.8997597","DOIUrl":"https://doi.org/10.1109/IAEAC47372.2019.8997597","url":null,"abstract":"This paper proposes a complex network topology optimization method based on NSGA-II with degrees and edges number unchanged. The method selects the elite parent networks by applying non-dominated layer sorting and congestion degree calculation through the network crossover and mutation operation to achieve maximum network efficiency and network invulnerability. Simulation analysis shows that the method can significantly improve the invulnerability and network efficiency of the initial networks at the same time. Optimizing the network efficiency makes the network connection show a negative correlation. The network presents a \"multi-core decentralized\" structure; optimizing the network invulnerability makes the connection show a positive correlation, the network presents a \"close core and scattered periphery\" structure; the cooperative optimization makes the network present a \"tighter core and large periphery\" structure, which is proved with good theoretical generality and practical application value.","PeriodicalId":164163,"journal":{"name":"2019 IEEE 4th Advanced Information Technology, Electronic and Automation Control Conference (IAEAC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130014037","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信