2021 IEEE International Conference on Electronic Technology, Communication and Information (ICETCI)最新文献

筛选
英文 中文
Research on Library Information Security Based on the Innovation Assistant System of Wanfang (STADS) 基于万方创新辅助系统(STADS)的图书馆信息安全研究
D. Jiang, Sheng Ye, Xu Xia
{"title":"Research on Library Information Security Based on the Innovation Assistant System of Wanfang (STADS)","authors":"D. Jiang, Sheng Ye, Xu Xia","doi":"10.1109/ICETCI53161.2021.9563575","DOIUrl":"https://doi.org/10.1109/ICETCI53161.2021.9563575","url":null,"abstract":"Object: Based on the paper output in library information security in China, to provide some enlightenment for the research and protection practice of library information security in the era of big data. Methods: The development of information security of digital libraries in China had been reviewed, and the journal papers on information security of domestic libraries had been retrieved and analyzed by the innovation assistant system of Wanfang (STADS) and vosviewer visual analysis tool. Result: 1191 research papers on library information security were obtained and statistically analyzed from the aspects of overall literature output, academic attention trend, journal paper output, active institutions and research hotspots. Conclusion: The main characteristics and laws of library information security research in China had been summarized. The output of library information security research papers had been generally stable, the degree of academic attention was weak, the overall quality of papers was good, and the research hotspots were prominent. The weak links and problems existed in the current research, and some suggestions to the research in this field in China had been put forward as follows: first improve the research of basic theory, and then strengthen the depth and breadth of technical research.","PeriodicalId":170858,"journal":{"name":"2021 IEEE International Conference on Electronic Technology, Communication and Information (ICETCI)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115385447","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on the Upgrading Method of Electronic Equipment 电子设备升级方法研究
X. Jiren, Liu Tongzan, Pei Kunpong, Wu Dongsheng, Z. Xiaolan
{"title":"Research on the Upgrading Method of Electronic Equipment","authors":"X. Jiren, Liu Tongzan, Pei Kunpong, Wu Dongsheng, Z. Xiaolan","doi":"10.1109/ICETCI53161.2021.9563543","DOIUrl":"https://doi.org/10.1109/ICETCI53161.2021.9563543","url":null,"abstract":"This paper introduces the method of electronic equipment upgrading in detail, including how to upgrade the emergency equipment or software maintenance, through a detailed analysis of the advantages and disadvantages of the existing electronic equipment, and finally gives the system of penis upgrading. And the method and specific process of software upgrading and transformation, for the upgrading and transformation of other electronic equipment, including software and hardware has a guiding significance.","PeriodicalId":170858,"journal":{"name":"2021 IEEE International Conference on Electronic Technology, Communication and Information (ICETCI)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115596290","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Pose Rectifying System Based on Bottom-up PAF Key Point Estimation Method 基于自底向上PAF关键点估计方法的位姿校正系统
T. Gao
{"title":"Pose Rectifying System Based on Bottom-up PAF Key Point Estimation Method","authors":"T. Gao","doi":"10.1109/ICETCI53161.2021.9563452","DOIUrl":"https://doi.org/10.1109/ICETCI53161.2021.9563452","url":null,"abstract":"Nowadays, well-designed and matured recovery trainings are widely available and required for professional athletes who injure or overstretch their muscle during trainings or games, while there is still a lack of such essential recovery process for common people who as well may encounter injury during some physical activities like working out, running, and so on. This automatic system which detects a person's body pose during the recovery training makes training at home for common people possible. Since patients have to rest for a period of time due to the injury, they may result in having different levels of muscle atrophy. Recovery training should thus be conducted so that patients could train their muscle to perform basic functions and continue with physical activities. This project aims at monitoring and enhancing the accuracy of patients' body poses during their healing exercise. By using OpenPose, a person's key points can be detected and analyzed. After reducing some distracting information in the images, the body key points are put into a pre-trained SVM model, and these key points will be then sorted into two groups of either right or wrong body pose. With such method, it is practical for injured people to conduct more efficient and accurate recovery training for their injured muscles by themselves without having to afford a personal trainer or go to the hospital every day.","PeriodicalId":170858,"journal":{"name":"2021 IEEE International Conference on Electronic Technology, Communication and Information (ICETCI)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115144951","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Effective Location Privacy-Preserving K-anonymity Scheme in Location Based Services 一种有效的基于位置服务的位置隐私保护k -匿名方案
Haoyu Liu, Shiwen Zhang, Mengling Li, Voundi Koe Arthur Sandor, Wei Liang
{"title":"An Effective Location Privacy-Preserving K-anonymity Scheme in Location Based Services","authors":"Haoyu Liu, Shiwen Zhang, Mengling Li, Voundi Koe Arthur Sandor, Wei Liang","doi":"10.1109/ICETCI53161.2021.9563598","DOIUrl":"https://doi.org/10.1109/ICETCI53161.2021.9563598","url":null,"abstract":"With the development of global positioning systems, communication technologies, the Internet and mobile terminals, location-based services (LBS) have become increasingly widely used. LBS brings great convenience to people's daily life and social activities. At the same time, people pay more attention to the problem of sensitive information leakage when using LBS. Users need to provide their accurate location information when sending queries to the LBS server. User location privacy is extremely vulnerable to serious threats during the exchange of services, and these location-related queries may cause serious privacy issues. In this paper, considering that the opponent may use auxiliary information such as data analysis and crawlers to determine the approximate location, we propose an effective location privacy-preserving k-anonymity scheme (PPKS) to generate virtual locations based on the probability density function in mathematical statistics to realize the k-anonymity of users with privacy zone awareness in LBS. We first determine the origin of the region and then calculate the probability density function of the X-axis and the Y-axis. Subsequently, the k-1 positions are distributed to the X-axis and Y-axis in proportion, respectively. Finally, according to the proportions, the k-1 virtual positions are generated. The results of security analysis and experimental evaluation show that the solution can significantly improve the level of privacy and anonymity.","PeriodicalId":170858,"journal":{"name":"2021 IEEE International Conference on Electronic Technology, Communication and Information (ICETCI)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114657688","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Stock Pricing Analysis between Bidders and Sellers Based on Stackelberg Game Theory 基于Stackelberg博弈论的买卖双方股票定价分析
Yi Su
{"title":"Stock Pricing Analysis between Bidders and Sellers Based on Stackelberg Game Theory","authors":"Yi Su","doi":"10.1109/ICETCI53161.2021.9563518","DOIUrl":"https://doi.org/10.1109/ICETCI53161.2021.9563518","url":null,"abstract":"With the development of institutional investors, the game between institutional investors and individual investors has become an important factor affecting the stock price. Exploring the buying and selling decisions made by different investors in a certain stock market can help to predict stock price. In this paper, we use the bidder to represent institutional investor and the sellers to represent individual investors. We propose a Stackelberg game model which achieves the optimal income utility of both parties. We also explore the equilibrium point and conditions for the establishment of equilibrium. Finally, we tested the feasibility of the Mechanism through simulation.","PeriodicalId":170858,"journal":{"name":"2021 IEEE International Conference on Electronic Technology, Communication and Information (ICETCI)","volume":"8 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126081834","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
C-V2X Greedy Cooperative Caching and Response Algorithm C-V2X贪婪协同缓存与响应算法
Tianwu Lin, Zhiwei Qiu, Zhexin Xu
{"title":"C-V2X Greedy Cooperative Caching and Response Algorithm","authors":"Tianwu Lin, Zhiwei Qiu, Zhexin Xu","doi":"10.1109/ICETCI53161.2021.9563520","DOIUrl":"https://doi.org/10.1109/ICETCI53161.2021.9563520","url":null,"abstract":"Greedy Cooperative Caching and Response Algorithm (GCCR) is proposed to relieve the communication load of base station as edge Caching source in C-V2X and improve the efficiency of data transmission. Under the constraint of node topological relationship, the greedy flooding cache node allocation order is adopted to increase the complementary cooperation of cache files of neighboring nodes. The result is not only to enrich cache content and increase request response rates, but also to increase service coverage for highly popular files, thereby reducing transmission delays and duplicate response rates.","PeriodicalId":170858,"journal":{"name":"2021 IEEE International Conference on Electronic Technology, Communication and Information (ICETCI)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125870281","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Load Balancing Algorithm Based on End-to-end Rerouting 基于端到端路由的负载均衡算法
Jin Guo, M. Liang, Zhiyu Liu
{"title":"A Load Balancing Algorithm Based on End-to-end Rerouting","authors":"Jin Guo, M. Liang, Zhiyu Liu","doi":"10.1109/ICETCI53161.2021.9563561","DOIUrl":"https://doi.org/10.1109/ICETCI53161.2021.9563561","url":null,"abstract":"With the quick growth of new Internet applications, the network load is increasing rapidly which may cause network congestion and has a certain impact on the transmission performance and user experience. There are two ways to solve this problem: increasing network bandwidth and balancing network load to increase network utilization. This paper mainly discusses the latter. As we all know, the shortest path algorithm is common for network routing, but it cannot balance the load between the network links, causing the load on some links heavy, we call the link with the heaviest load as the peak link. This paper proposes a new Load Balancing algorithm based on End-to-end Rerouting (LBER). First, the peak link is obtained according to the load status of the network links. Then, the load of the peak link is decreased by additional cost to punish it, that all the paths through the peak link are rerouted from end to end. The ultimate goal is to minimize the peak link load. Simulation experiments show that this algorithm can effectively reduce the peak traffic of the network compared with the existing shortest path algorithm by an average of 29.29%, which means the network bandwidth utilization is improved notably.","PeriodicalId":170858,"journal":{"name":"2021 IEEE International Conference on Electronic Technology, Communication and Information (ICETCI)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127496718","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Automatic Recognition of Pointer Meter Reading Based on Yolov4 and Improved U-net Algorithm 基于Yolov4和改进U-net算法的指针式抄表自动识别
Jishen Peng, Mingyang Xu, Yunfeng Yan
{"title":"Automatic Recognition of Pointer Meter Reading Based on Yolov4 and Improved U-net Algorithm","authors":"Jishen Peng, Mingyang Xu, Yunfeng Yan","doi":"10.1109/ICETCI53161.2021.9563496","DOIUrl":"https://doi.org/10.1109/ICETCI53161.2021.9563496","url":null,"abstract":"Pointer meters are widely used in life and industrial production due to their simple structure, good reliability, high-cost performance, and intuitive and convenient reading. With the improvement of artificial intelligence and automation level, the application of drones in substation inspections has become more and more extensive, which has brought convenience to image collection, but the problem of the accuracy of reading recognition of pointer meters has not been well resolved. Using the current mainstream algorithms, due to the complexity of the surrounding environment, dust pollution, and other factors, the obtained image contains a lot of noise, which affects the accuracy of reading recognition. In this paper, YOLOV4 is used to detect the position of the dial in the images and classify the meters; then combined with the characteristics of the meter image, the improved U-Net image segmentation technology to effectively extract the pointers in the area, accurately identify the meter readings, and use the collected power equipment sample training data set to test the algorithm. The improved U-Net improves the learning ability of the shallow information of the image, reduces the loss of edge features, and improves the segmentation effect of the target.","PeriodicalId":170858,"journal":{"name":"2021 IEEE International Conference on Electronic Technology, Communication and Information (ICETCI)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126586534","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Design and Application of Graphical Shunting Based on C/S Architecture in Factory and Mining Enterprises 基于C/S架构的工矿企业图形化调车系统设计与应用
Ting-yu Gao, Baodi Xiao, Lili Yue, K. Rao
{"title":"Design and Application of Graphical Shunting Based on C/S Architecture in Factory and Mining Enterprises","authors":"Ting-yu Gao, Baodi Xiao, Lili Yue, K. Rao","doi":"10.1109/ICETCI53161.2021.9563526","DOIUrl":"https://doi.org/10.1109/ICETCI53161.2021.9563526","url":null,"abstract":"In factories and mines station, shunting have the primary task of transportation, large and frequent shunting operation has brought serious problems to management; its timeliness and larger traffic requirements of its information integration, operational efficiency, The accuracy is higher. The current information management system is mainly based on reports and printing freight information files. Its information integration is low, and the operation of preparing a locomotive coupler plan is too cumbersome. The author proposes to adopt a graphical shunting based on C/S architecture. Module, automatic preparation of hook plan and locomotive operation diagram, better realization of human-computer interaction and system response.","PeriodicalId":170858,"journal":{"name":"2021 IEEE International Conference on Electronic Technology, Communication and Information (ICETCI)","volume":"124 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121545131","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Computer Artificial Intelligence Technology in Improving the Quality of Environmental Design 计算机人工智能技术在提高环境设计质量中的应用
Zeng Yuan, Liang Ding, Shi Yi
{"title":"Computer Artificial Intelligence Technology in Improving the Quality of Environmental Design","authors":"Zeng Yuan, Liang Ding, Shi Yi","doi":"10.1109/ICETCI53161.2021.9563400","DOIUrl":"https://doi.org/10.1109/ICETCI53161.2021.9563400","url":null,"abstract":"The rapid development of modern information technology has made virtual reality technology gradually. The ability of virtual reality technology to deconstruct space data and visual imaging capabilities has improved the prospects of computer artificial intelligence virtual reality technology in indoor space design. This paper uses virtual reality technology in the indoor space of the Internet of Things smart home to study the application of virtual reality technology in the performance of indoor space design, through the deconstruction of virtual reality technology in indoor space and the improvement measures in virtual reality in environmental art design Research and explore the new ideas and new methods that virtual reality technology brings to many aspects of indoor space, and clarify the development prospects of virtual reality technology in environmental art design","PeriodicalId":170858,"journal":{"name":"2021 IEEE International Conference on Electronic Technology, Communication and Information (ICETCI)","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131419726","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信