{"title":"Application of laser ultrasound in the detection of metal microstructure","authors":"Hongqin Wu, Xue Bai, He Wang, Jian Ma","doi":"10.1117/12.2682254","DOIUrl":"https://doi.org/10.1117/12.2682254","url":null,"abstract":"Laser ultrasonic backscattering is of great significance to nondestructive evaluation of the microstructure of strong-scattering metal materials. However, it is difficult to extract the microstructural backscattering signals because of high-level electrical noises. In this manuscript, the laser ultrasonic backscattering characteristics of metal microstructure are analyzed and studied based on the Empirical Mode Decomposition (EMD). TA2 titanium alloy was heat-treated at 800°C for different times to obtain single-phase titanium alloy specimens with different grain sizes. The laser-ultrasonic waveforms transmitted by the bottom surface of the sample were obtained. The EMD was performed on the backscattering noise signal between two successive pulse echo signals, and the multi-order Intrinsic Mode Function (IMF) was obtained. The correlation between the average spectrum of multiple measurements of each order IMF and the spectrum of the first longitudinal wave pulse echo was analyzed. and the IMF with the largest correlation coefficient was selected as the effective IMF, which was the most relevant to the microstructure. Subsequently, the backscattering levels of each sample were calculated based on the variance analysis of the effective IMF measured at multiple points. The results have shown that the backscattering level is positively correlated with the grain size of the metal structure in a specific frequency range.","PeriodicalId":177416,"journal":{"name":"Conference on Electronic Information Engineering and Data Processing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114792422","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on fault detection of power company computer room information management automation operation and maintenance platform based on big data","authors":"Fei Wu, Fucai Luo, Ting Li, Yanlong Su, Zhen Wu, Liqing Wen","doi":"10.1117/12.2682253","DOIUrl":"https://doi.org/10.1117/12.2682253","url":null,"abstract":"The number of enterprise application servers continues to grow rapidly, which brings trouble to the enterprise application server architecture. The complicated work makes the operation and maintenance of enterprise server inefficient. Throughout the Internet enterprises at home and abroad, the research of information automatic operation and maintenance has always been in an important position. This paper studies the fault detection of the automatic operation and maintenance platform of power company's computer room information management based on big data. Firstly, using the literature research method, this paper expounds the significance of automatic operation and maintenance of information management in the computer room of power companies and the problems existing in the platform, and introduces the related technologies of automatic operation and maintenance platform of information management. Then, by using big data mining technology, this paper studies the automatic operation and maintenance platform of power company's computer room information management, and mainly studies the accuracy of fault detection of power company's computer room information management automatic operation and maintenance platform. According to the survey results, the main types of failure problems are database failure (insufficient archiving space, cluster service exception, service exception, etc.) and virtualization platform failure (insufficient space, host performance, network exception, etc.), in which database failure accounts for about 46% of virtualization platform failure, and operating system failure (insufficient disk space, insufficient CPU memory performance, abnormal system shutdown, etc.) accounts for a low proportion of virtualization platform failure, but there are. The failure prediction of computer room information management automation operation and maintenance platform is mainly the prediction of operating system failure. Its prediction accuracy is high, but the fault prediction of database and virtualization platform is not high. It can be seen from this that the power company has a relatively large investment in power equipment, and the research on database and virtual platform technology is not mature.","PeriodicalId":177416,"journal":{"name":"Conference on Electronic Information Engineering and Data Processing","volume":"603 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123321077","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Xinjie Ju, Hang Zhu, Xiaojun Zou, Ming Tan, Wei Song
{"title":"A full parameter estimation method of LFM pulse signal","authors":"Xinjie Ju, Hang Zhu, Xiaojun Zou, Ming Tan, Wei Song","doi":"10.1117/12.2682434","DOIUrl":"https://doi.org/10.1117/12.2682434","url":null,"abstract":"To solve the reconnaissance problem of Linear Frequency Modulation (LFM) pulse signal, this paper proposes an estimation method for the full set of parameters of frequency modulation slope, initial frequency, pulse repetition period, duty cycle, and pulse width. Firstly, the Fractional Fourier Transform (FRFT) is used to estimate the frequency modulation slope and the initial frequency of the signal. Secondly, the method of periodic accumulation is used to improve the signal-to-noise ratio, and a specific threshold value is set to estimate the duty cycle. Finally, the parameters of pulse repetition period and pulse width are estimated by autocorrelation function method. The simulation results show that the method can accurately detect the relevant parameters of LFM pulse signal.","PeriodicalId":177416,"journal":{"name":"Conference on Electronic Information Engineering and Data Processing","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122956959","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Exploring the factors affecting the communication transmission performance of LORA technology","authors":"Zhaobin Wu, Qiguang Shen, Changshan He","doi":"10.1117/12.2682362","DOIUrl":"https://doi.org/10.1117/12.2682362","url":null,"abstract":"The factors affecting the transmission performance of LORA technology are further studied to deepen the analysis and understanding of the quality of the communication links of LOAR technology. In this paper, we study the transmission experiments of the LoRa technique at different emission powers and at different aerial speeds to verify its communication quality. The experimental results show that the communication distance and communication quality, which is the signal packet loss rate, are significantly changed with the emission power and air velocity. Then, the power consumption of LORA transceiver is studied and tested in this paper, which shows a linear relationship between node power consumption and air rate.","PeriodicalId":177416,"journal":{"name":"Conference on Electronic Information Engineering and Data Processing","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128482101","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A multi-targets simulation method based on single channel","authors":"Boda Jing, Congjun Jin, Youbin Song","doi":"10.1117/12.2682294","DOIUrl":"https://doi.org/10.1117/12.2682294","url":null,"abstract":"The number of channels for radio frequency simulation system is very limited, and the traditional simulation method of one channel simulating one target is difficult to meet the demand of complex scene simulation. This paper proposes a simulation method based on the triadic vector control algorithm of \"both amplitude and phase control\" to simulate the angular position of multiple radar targets by one channel, and further researches the simulation method based on digital radio frequency memory technology to simulate the multidimensional characteristics of multiple radar targets such as delay, doppler frequency, amplitude and angle by one channel. Mathematical simulation experiments are designed to verify the feasibility of the method.","PeriodicalId":177416,"journal":{"name":"Conference on Electronic Information Engineering and Data Processing","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122595030","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Wireless monitoring of transformer bushing dielectric loss based on space laser communication technology","authors":"W. Zhao, Weiqiang Wang, Yadong Li","doi":"10.1117/12.2682286","DOIUrl":"https://doi.org/10.1117/12.2682286","url":null,"abstract":"To reduce transformer faults to ensure the safe operation of the power system, and at the same time avoid external interference to improve the accuracy of monitoring, this paper proposes a wireless detection method for dielectric loss of substation capacitive equipment based on space laser communication technology. Firstly, the data samples of space laser communication network information are collected, the dielectric loss factor is calculated by using the harmonic analysis method, and the data samples are pre-processed, then artificial intelligence is used to design the space laser communication dielectric loss detection model, and finally, the space laser communication dielectric loss detection experiment is carried out. The detection experiment results show that this method can effectively improve the correct detection rate of the dielectric loss factor.","PeriodicalId":177416,"journal":{"name":"Conference on Electronic Information Engineering and Data Processing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126352459","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design of forest fire risk meteorological forecast model based on data superposition","authors":"Jian Wang, Lei Wang, Danchuang Zhang, Jianwen Xu, Mingshan Tang, Xueling Weng","doi":"10.1117/12.2682507","DOIUrl":"https://doi.org/10.1117/12.2682507","url":null,"abstract":"Using the data of automatic weather observation station, intelligent grid forecast, forest vegetation underlying surface, this paper selects meteorological factors such as temperature, precipitation, wind speed, relative humidity as dynamic factors, and the vegetation underlying surface data matching the intelligent grid based on geographic information as static factors. A 1km×1km refined forest fire weather grade forecast model based on data superposition was built, and GIS spatial analysis and visualization technology was applied to the construction of forest fire risk model and the production of fire risk meteorological grade forecast graphics. The business application of this research is of great significance to the establishment of a complete forest fire prevention system in Dalian, the protection of the natural environment of the forest, the maintenance of sustainable ecological development and the safety of human life and property.","PeriodicalId":177416,"journal":{"name":"Conference on Electronic Information Engineering and Data Processing","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120964585","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A robust audio watermarking algorithm based on graph Fourier transform and singular value decomposition","authors":"Shuang Han, Mei-chih Huang","doi":"10.1117/12.2682443","DOIUrl":"https://doi.org/10.1117/12.2682443","url":null,"abstract":"In order to solve the robustness problem of audio watermarking, this paper proposes a robust audio watermarking algorithm based on Graph Fourier transform and singular value decomposition. The Arnold transform is used to scramble and encrypt the image watermark, and then the watermark is embedded in the audio carrier by graph Fourier transform and singular value decomposition. Through experimental simulation, the audio carrier can still extract a complete watermark after various attacks such as noise, resampling, filtering, and compression, indicating that the algorithm has good robustness.","PeriodicalId":177416,"journal":{"name":"Conference on Electronic Information Engineering and Data Processing","volume":"85 7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127988173","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A survey on event connections and their discovery for cloud service","authors":"Zhen Zhang, Chunhe Xia, Shuyu Li, Zhiying Liu, Mingzhi Huang, Cheng-Zhuan Huang, Xiaojian Li","doi":"10.1117/12.2682420","DOIUrl":"https://doi.org/10.1117/12.2682420","url":null,"abstract":"Connection is the effect between events. It is an important basis for judging of violations and source-trace of failure in cloud service accountability. This paper presents a survey on the event connections including the features, method of discovery and correction. Most of recent research on event connections in cloud services relying on manually labeling and correcting to event connections, and a few of them have achieved automatically labeling of event connections. Finally, we give out a taxonomy of the recent research, some problems in the method of discovery and correction, and an approach in the paper.","PeriodicalId":177416,"journal":{"name":"Conference on Electronic Information Engineering and Data Processing","volume":"89 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127420072","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A vulnerability automation exploitation method based on symbolic execution","authors":"Xueshuai Ge, Tieming Liu, Yaobin Xie, Yuanyuan Zhang","doi":"10.1117/12.2682314","DOIUrl":"https://doi.org/10.1117/12.2682314","url":null,"abstract":"With increasing number of software vulnerabilities, the quantity of attacks utilizing malicious samples is also on rise, leading to intensified adversarial competition. In particular, the application of automatic vulnerability mining techniques has resulted in a significant increase in the number of vulnerabilities, but security researchers often do not have enough time to deal with them. This paper proposes a symbol-execution-based automated vulnerability exploitation method, which can achieve automation of vulnerability detection, classification and exploitation. Finally, this paper designs and implements a prototype system for symbol-execution-based automated vulnerability exploitation and verifies its effectiveness through experiments. This research provides security analysts with an in-depth understanding of the types of vulnerabilities and determines methods for vulnerability exploitability, further improving the efficiency of analyzing and fixing vulnerabilities.","PeriodicalId":177416,"journal":{"name":"Conference on Electronic Information Engineering and Data Processing","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129201724","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}