{"title":"Identification method of residents' medical travel behavior characteristics driven by mobile signaling data: A Case Study of Kunshan","authors":"Liu Huan, Lu Zhenbo","doi":"10.1109/ISCTT51595.2020.00042","DOIUrl":"https://doi.org/10.1109/ISCTT51595.2020.00042","url":null,"abstract":"With quick development of big data technology, how to analyze the characteristics of residents' medical travel behavior comprehensively and accurately provides basic data support for the supply and demand evaluation of urban public medical service facilities and the layout optimization decision-making. Aiming at the limitations of traditional traffic data sources, a method for identifying urban residents' medical travel behavior characteristics using mobile phone signaling data under the LTE network as the core data source was constructed. Taking Kunshan City as an example, this method identifies the characteristics of users' stay behavior, workplace and residence, and travel OD information based mobile signaling data. Then this method combines the POI data of medical public service facilities, and obtains the corresponding relationship table between hospital and mobile base station through the association matching between mobile base station and grade hospital. Finally, the method identifies the OD of medical travel behavior based on the information, which include travel OD and characteristics of residents' workplace and residence and stay behavior obtained from signaling data, and the corresponding relationship between hospital and mobile base station, and comprehensively analyzes the individual attribute characteristics and travel characteristics of urban residents who have had medical travel behavior.","PeriodicalId":178054,"journal":{"name":"2020 5th International Conference on Information Science, Computer Technology and Transportation (ISCTT)","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116743348","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Data Augmentation and Deep Learning Modeling Methods on Edge-Device-Based Sign Language Recognition","authors":"Yuzhe Ding, Shaofei Huang, Roubo Peng","doi":"10.1109/ISCTT51595.2020.00093","DOIUrl":"https://doi.org/10.1109/ISCTT51595.2020.00093","url":null,"abstract":"In this paper, methods of realizing sign language recognition (SLR) on mobile edge devices - AutoML and Transfer Learning - are recommended and compared. Their performance in SLR is compared in this article in terms of model size, speed, and accuracy. To perform a more reliable comparative analysis, we first built and applied data augmentation to obtain a benchmark dataset based on Chinese Sign Language (CSL). With this dataset, models were then trained and deployed to mobile edge devices for real-time testing. It is found that data augmentation can effectively improve the diversity of datasets and improve the robustness of the trained model. The results of the model comparison show that AutoML is more dominant in accuracy, and Transfer Learning is more suitable for low-latency applications. In addition, AutoML excels at classifying macroscopically homogeneous images, such as gestures, despite its low training speed. On the other hand, the training process of Transfer Learning is speedy, but low accuracy remains to be its problem. These conclusions are of guiding significance to the lightweight mobile application implementation of SLR.","PeriodicalId":178054,"journal":{"name":"2020 5th International Conference on Information Science, Computer Technology and Transportation (ISCTT)","volume":"43 6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123783646","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ken Chen, Meng Zhang, Yong Tang, Jianxing Li, Yong Liu, Jun He
{"title":"Impact of Visibility Classification Schemes on Traffic Efficiency in Intelligent Freeway Management Systems A Mechanism for all-Weather Transportation Services with Vehicle-Road Coordination Technology","authors":"Ken Chen, Meng Zhang, Yong Tang, Jianxing Li, Yong Liu, Jun He","doi":"10.1109/ISCTT51595.2020.00124","DOIUrl":"https://doi.org/10.1109/ISCTT51595.2020.00124","url":null,"abstract":"Visibility often has large impact on driving safety and speed, thus is an important factor to be considered in freeway management. In this article, we propose a methodology to evaluate the visibility and its impact on freeway transportation. We carefully examined the concept of visibility, and propose classification schemes and controlling mechanisms designed accordingly. Furthermore, we evaluate traffic efficiency as outcome of the schemes and likelihood of congestion by defining a Delay Index, modelling and simulating a few scenarios and benchmarking to big data statistics from China major cities. Results from our study show that with proper designed mechanisms, the overall efficiency and safety of the freeway transportation will be improved. Once applied to commercial systems and become fully operative in Vehicle-Road Coordination systems, transportation in all-weather conditions can be gradually achieved and will bring significant social and economic benefits.","PeriodicalId":178054,"journal":{"name":"2020 5th International Conference on Information Science, Computer Technology and Transportation (ISCTT)","volume":"469 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123879348","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Reinforcement Design Calculation Analysis of the CFST Arch Bridge","authors":"C. Lijun, H. Ning, Zhang Maohui, Sun Fuwei","doi":"10.1109/ISCTT51595.2020.00052","DOIUrl":"https://doi.org/10.1109/ISCTT51595.2020.00052","url":null,"abstract":"Based on one calculation example, the stress analysis is given to the CFST arch bridge which has been reinforced. The calculation results reveal that the bridge can meet the demand of the design load after maintaining, but the structure's insurance isn't very enough., which should be paid more attention. On the foundation of statics analysis, but also analyzed the stability and the dynamic performance of this CFST arch bridge, the analysis result indicates that the whole stability of the bridge is relatively good.","PeriodicalId":178054,"journal":{"name":"2020 5th International Conference on Information Science, Computer Technology and Transportation (ISCTT)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131576120","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analysis and Prediction of COVID-19 in Xinjiang Based on Machine Learning","authors":"Y. Liu, Yan Xiao","doi":"10.1109/ISCTT51595.2020.00072","DOIUrl":"https://doi.org/10.1109/ISCTT51595.2020.00072","url":null,"abstract":"Covid-19 has taken the world by storm, dramatically affecting the lives of people around the world. China is a major country in the fight against the epidemic. It has provided the world with a wealth of valuable experience in the prevention and treatment of COVID-19.Based on the data released by Xinjiang Health Commission, this study used mathematical modeling method to reasonably predict and analyze the trend of the number of coVID-19 confirmed in the recent outbreak in Xinjiang through machine learning polynomial regression under limited data conditions, aiming at the coVID-19 outbreak in Xinjiang in July.","PeriodicalId":178054,"journal":{"name":"2020 5th International Conference on Information Science, Computer Technology and Transportation (ISCTT)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127639479","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research and Implementation of Non-uniform Distribution Random Beamforming Algorithm","authors":"Yujuan Qin","doi":"10.1109/ISCTT51595.2020.00080","DOIUrl":"https://doi.org/10.1109/ISCTT51595.2020.00080","url":null,"abstract":"Most of the hybrid CSI beamforming schemes consider the channel environment as the ideal uncorrelated channel, and do not take into account the long-term spatial correlation information of users. Most of them adopt the assumption that the users in the cell are evenly distributed around the base station, which is inconsistent with the actual wireless communication environment. According to the characteristics of non-uniform distribution of users around the base station, this paper studies two non-uniform distribution random beamforming algorithms and their implementation.","PeriodicalId":178054,"journal":{"name":"2020 5th International Conference on Information Science, Computer Technology and Transportation (ISCTT)","volume":"474 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134409967","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"ATO Recommended Speed Curve Optimization based on Artificial Bee Colony Algorithm","authors":"Fei Qiang, He Tao, Zhang Rui","doi":"10.1109/ISCTT51595.2020.00065","DOIUrl":"https://doi.org/10.1109/ISCTT51595.2020.00065","url":null,"abstract":"Aiming at the problem of high train traction energy consumption in urban rail transit, this paper combined the optimization of train recommended speed curve and ATO driving strategy, and proposed an optimization algorithm of train energy-saving driving strategy based on artificial bee swarm algorithm. Firstly, an optimization model of train recommended speed curve was established. Secondly, an optimization calculation method of train recommended speed curve based on artificial bee swarm algorithm was proposed based on driver's driving experience. Then, an energy-saving cruising driving strategy was designed to improve ATO's original driving strategy. Finally, the algorithm was verified by simulation with actual data. The simulation results show that when the algorithm is used to control the driving, the energy consumption can be reduced by 6.9% and the calculation time is 18.25s under the condition of meeting the constraints of interval running time. The algorithm has fast convergence speed, small calculation time and obvious energy-saving effect, which has certain practical significance for reducing the train traction energy consumption.","PeriodicalId":178054,"journal":{"name":"2020 5th International Conference on Information Science, Computer Technology and Transportation (ISCTT)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125216458","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Review on Generative Adversarial Networks","authors":"Yiqin Yuan, Yuhao Guo","doi":"10.1109/ISCTT51595.2020.00074","DOIUrl":"https://doi.org/10.1109/ISCTT51595.2020.00074","url":null,"abstract":"GenerativeAdversarial Networks (GAN) is currently one of the hottest subjects in the field of Artificial Intelligence; it has a significant impact on the development of generative models. The excellence of GAN is that it is based on zero-sum game theory and has a generator as well as a discriminator that optimize each other and finally receive the optimal result. In recent years, many different types of GAN optimization models have emerged, which can be classified by the different structure of their generators and discriminators. Since most of the experiments of the models are conducted on the datasets of MNIST, SVHN, CIFAR10, etc., the performance of each model on those datasets is evaluated. Then some of the applications and the methods of optimizing the models of GAN are explained. Finally, we propose challenges that GAN faces and the prospect of GAN.","PeriodicalId":178054,"journal":{"name":"2020 5th International Conference on Information Science, Computer Technology and Transportation (ISCTT)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134446452","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design and implementation of VDES Link Layer protocol applied to intelligent vessels","authors":"Liang Ma, Xin Sun, Jie Wen","doi":"10.1109/ISCTT51595.2020.00079","DOIUrl":"https://doi.org/10.1109/ISCTT51595.2020.00079","url":null,"abstract":"In recent years, intelligent vessels have become a new hot issue in the international maritime field. As a next-generation maritime dedicated mobile communication system, VDES can meet the communication needs of intelligent vessels. According to the VDES protocol stack, the function of the VDES data link layer is analyzed, the VDES link layer protocol signaling procedures and its interfaces are designed, and the VDES link layer function is developed on the Linux platform by using the C language. The testing environment of VDES DLL protocol is built to verify the feasibility of the protocol. The design and implementation of the protocol provide a reliable transmission method for the communication of intelligent vessels, and give a reference for the development of VDES system.","PeriodicalId":178054,"journal":{"name":"2020 5th International Conference on Information Science, Computer Technology and Transportation (ISCTT)","volume":"101 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117260892","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design and analysis of a new RFID Security Protocol for Internet of things","authors":"Zixuan Liu, Jie Yu","doi":"10.1109/ISCTT51595.2020.00010","DOIUrl":"https://doi.org/10.1109/ISCTT51595.2020.00010","url":null,"abstract":"As the core of the third information revolution, the Internet of things plays an important role in the development of the times. According to the relevant investigation and research, we can find that the research on the Internet of things is still in the stage of LAN and private network, and its open advantages have not been fully utilized[1]. In this context, RFID technology as the core technology of the Internet of things, the security protocol plays an important role in the normal use of the technology. With the continuous development of Internet information technology, the disadvantages of security protocol become more and more obvious. These problems seriously affect the popularity of Internet of things technology. Therefore, in the future work, the relevant staff need to continue to strengthen research, according to the future development plan, effectively play the advantages of technology, and further promote its development.","PeriodicalId":178054,"journal":{"name":"2020 5th International Conference on Information Science, Computer Technology and Transportation (ISCTT)","volume":"215 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124235695","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}