2020 5th International Conference on Information Science, Computer Technology and Transportation (ISCTT)最新文献

筛选
英文 中文
Identification method of residents' medical travel behavior characteristics driven by mobile signaling data: A Case Study of Kunshan 基于移动信令数据驱动的居民医疗出行行为特征识别方法——以昆山市为例
Liu Huan, Lu Zhenbo
{"title":"Identification method of residents' medical travel behavior characteristics driven by mobile signaling data: A Case Study of Kunshan","authors":"Liu Huan, Lu Zhenbo","doi":"10.1109/ISCTT51595.2020.00042","DOIUrl":"https://doi.org/10.1109/ISCTT51595.2020.00042","url":null,"abstract":"With quick development of big data technology, how to analyze the characteristics of residents' medical travel behavior comprehensively and accurately provides basic data support for the supply and demand evaluation of urban public medical service facilities and the layout optimization decision-making. Aiming at the limitations of traditional traffic data sources, a method for identifying urban residents' medical travel behavior characteristics using mobile phone signaling data under the LTE network as the core data source was constructed. Taking Kunshan City as an example, this method identifies the characteristics of users' stay behavior, workplace and residence, and travel OD information based mobile signaling data. Then this method combines the POI data of medical public service facilities, and obtains the corresponding relationship table between hospital and mobile base station through the association matching between mobile base station and grade hospital. Finally, the method identifies the OD of medical travel behavior based on the information, which include travel OD and characteristics of residents' workplace and residence and stay behavior obtained from signaling data, and the corresponding relationship between hospital and mobile base station, and comprehensively analyzes the individual attribute characteristics and travel characteristics of urban residents who have had medical travel behavior.","PeriodicalId":178054,"journal":{"name":"2020 5th International Conference on Information Science, Computer Technology and Transportation (ISCTT)","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116743348","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Data Augmentation and Deep Learning Modeling Methods on Edge-Device-Based Sign Language Recognition 基于边缘设备的手语识别的数据增强和深度学习建模方法
Yuzhe Ding, Shaofei Huang, Roubo Peng
{"title":"Data Augmentation and Deep Learning Modeling Methods on Edge-Device-Based Sign Language Recognition","authors":"Yuzhe Ding, Shaofei Huang, Roubo Peng","doi":"10.1109/ISCTT51595.2020.00093","DOIUrl":"https://doi.org/10.1109/ISCTT51595.2020.00093","url":null,"abstract":"In this paper, methods of realizing sign language recognition (SLR) on mobile edge devices - AutoML and Transfer Learning - are recommended and compared. Their performance in SLR is compared in this article in terms of model size, speed, and accuracy. To perform a more reliable comparative analysis, we first built and applied data augmentation to obtain a benchmark dataset based on Chinese Sign Language (CSL). With this dataset, models were then trained and deployed to mobile edge devices for real-time testing. It is found that data augmentation can effectively improve the diversity of datasets and improve the robustness of the trained model. The results of the model comparison show that AutoML is more dominant in accuracy, and Transfer Learning is more suitable for low-latency applications. In addition, AutoML excels at classifying macroscopically homogeneous images, such as gestures, despite its low training speed. On the other hand, the training process of Transfer Learning is speedy, but low accuracy remains to be its problem. These conclusions are of guiding significance to the lightweight mobile application implementation of SLR.","PeriodicalId":178054,"journal":{"name":"2020 5th International Conference on Information Science, Computer Technology and Transportation (ISCTT)","volume":"43 6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123783646","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Impact of Visibility Classification Schemes on Traffic Efficiency in Intelligent Freeway Management Systems A Mechanism for all-Weather Transportation Services with Vehicle-Road Coordination Technology 基于车路协调技术的全天候交通服务机制研究
Ken Chen, Meng Zhang, Yong Tang, Jianxing Li, Yong Liu, Jun He
{"title":"Impact of Visibility Classification Schemes on Traffic Efficiency in Intelligent Freeway Management Systems A Mechanism for all-Weather Transportation Services with Vehicle-Road Coordination Technology","authors":"Ken Chen, Meng Zhang, Yong Tang, Jianxing Li, Yong Liu, Jun He","doi":"10.1109/ISCTT51595.2020.00124","DOIUrl":"https://doi.org/10.1109/ISCTT51595.2020.00124","url":null,"abstract":"Visibility often has large impact on driving safety and speed, thus is an important factor to be considered in freeway management. In this article, we propose a methodology to evaluate the visibility and its impact on freeway transportation. We carefully examined the concept of visibility, and propose classification schemes and controlling mechanisms designed accordingly. Furthermore, we evaluate traffic efficiency as outcome of the schemes and likelihood of congestion by defining a Delay Index, modelling and simulating a few scenarios and benchmarking to big data statistics from China major cities. Results from our study show that with proper designed mechanisms, the overall efficiency and safety of the freeway transportation will be improved. Once applied to commercial systems and become fully operative in Vehicle-Road Coordination systems, transportation in all-weather conditions can be gradually achieved and will bring significant social and economic benefits.","PeriodicalId":178054,"journal":{"name":"2020 5th International Conference on Information Science, Computer Technology and Transportation (ISCTT)","volume":"469 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123879348","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Reinforcement Design Calculation Analysis of the CFST Arch Bridge CFST拱桥配筋设计计算分析
C. Lijun, H. Ning, Zhang Maohui, Sun Fuwei
{"title":"Reinforcement Design Calculation Analysis of the CFST Arch Bridge","authors":"C. Lijun, H. Ning, Zhang Maohui, Sun Fuwei","doi":"10.1109/ISCTT51595.2020.00052","DOIUrl":"https://doi.org/10.1109/ISCTT51595.2020.00052","url":null,"abstract":"Based on one calculation example, the stress analysis is given to the CFST arch bridge which has been reinforced. The calculation results reveal that the bridge can meet the demand of the design load after maintaining, but the structure's insurance isn't very enough., which should be paid more attention. On the foundation of statics analysis, but also analyzed the stability and the dynamic performance of this CFST arch bridge, the analysis result indicates that the whole stability of the bridge is relatively good.","PeriodicalId":178054,"journal":{"name":"2020 5th International Conference on Information Science, Computer Technology and Transportation (ISCTT)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131576120","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analysis and Prediction of COVID-19 in Xinjiang Based on Machine Learning 基于机器学习的新疆新冠肺炎疫情分析与预测
Y. Liu, Yan Xiao
{"title":"Analysis and Prediction of COVID-19 in Xinjiang Based on Machine Learning","authors":"Y. Liu, Yan Xiao","doi":"10.1109/ISCTT51595.2020.00072","DOIUrl":"https://doi.org/10.1109/ISCTT51595.2020.00072","url":null,"abstract":"Covid-19 has taken the world by storm, dramatically affecting the lives of people around the world. China is a major country in the fight against the epidemic. It has provided the world with a wealth of valuable experience in the prevention and treatment of COVID-19.Based on the data released by Xinjiang Health Commission, this study used mathematical modeling method to reasonably predict and analyze the trend of the number of coVID-19 confirmed in the recent outbreak in Xinjiang through machine learning polynomial regression under limited data conditions, aiming at the coVID-19 outbreak in Xinjiang in July.","PeriodicalId":178054,"journal":{"name":"2020 5th International Conference on Information Science, Computer Technology and Transportation (ISCTT)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127639479","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Research and Implementation of Non-uniform Distribution Random Beamforming Algorithm 非均匀分布随机波束形成算法的研究与实现
Yujuan Qin
{"title":"Research and Implementation of Non-uniform Distribution Random Beamforming Algorithm","authors":"Yujuan Qin","doi":"10.1109/ISCTT51595.2020.00080","DOIUrl":"https://doi.org/10.1109/ISCTT51595.2020.00080","url":null,"abstract":"Most of the hybrid CSI beamforming schemes consider the channel environment as the ideal uncorrelated channel, and do not take into account the long-term spatial correlation information of users. Most of them adopt the assumption that the users in the cell are evenly distributed around the base station, which is inconsistent with the actual wireless communication environment. According to the characteristics of non-uniform distribution of users around the base station, this paper studies two non-uniform distribution random beamforming algorithms and their implementation.","PeriodicalId":178054,"journal":{"name":"2020 5th International Conference on Information Science, Computer Technology and Transportation (ISCTT)","volume":"474 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134409967","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ATO Recommended Speed Curve Optimization based on Artificial Bee Colony Algorithm 基于人工蜂群算法的ATO推荐速度曲线优化
Fei Qiang, He Tao, Zhang Rui
{"title":"ATO Recommended Speed Curve Optimization based on Artificial Bee Colony Algorithm","authors":"Fei Qiang, He Tao, Zhang Rui","doi":"10.1109/ISCTT51595.2020.00065","DOIUrl":"https://doi.org/10.1109/ISCTT51595.2020.00065","url":null,"abstract":"Aiming at the problem of high train traction energy consumption in urban rail transit, this paper combined the optimization of train recommended speed curve and ATO driving strategy, and proposed an optimization algorithm of train energy-saving driving strategy based on artificial bee swarm algorithm. Firstly, an optimization model of train recommended speed curve was established. Secondly, an optimization calculation method of train recommended speed curve based on artificial bee swarm algorithm was proposed based on driver's driving experience. Then, an energy-saving cruising driving strategy was designed to improve ATO's original driving strategy. Finally, the algorithm was verified by simulation with actual data. The simulation results show that when the algorithm is used to control the driving, the energy consumption can be reduced by 6.9% and the calculation time is 18.25s under the condition of meeting the constraints of interval running time. The algorithm has fast convergence speed, small calculation time and obvious energy-saving effect, which has certain practical significance for reducing the train traction energy consumption.","PeriodicalId":178054,"journal":{"name":"2020 5th International Conference on Information Science, Computer Technology and Transportation (ISCTT)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125216458","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Review on Generative Adversarial Networks 生成对抗网络研究进展
Yiqin Yuan, Yuhao Guo
{"title":"A Review on Generative Adversarial Networks","authors":"Yiqin Yuan, Yuhao Guo","doi":"10.1109/ISCTT51595.2020.00074","DOIUrl":"https://doi.org/10.1109/ISCTT51595.2020.00074","url":null,"abstract":"GenerativeAdversarial Networks (GAN) is currently one of the hottest subjects in the field of Artificial Intelligence; it has a significant impact on the development of generative models. The excellence of GAN is that it is based on zero-sum game theory and has a generator as well as a discriminator that optimize each other and finally receive the optimal result. In recent years, many different types of GAN optimization models have emerged, which can be classified by the different structure of their generators and discriminators. Since most of the experiments of the models are conducted on the datasets of MNIST, SVHN, CIFAR10, etc., the performance of each model on those datasets is evaluated. Then some of the applications and the methods of optimizing the models of GAN are explained. Finally, we propose challenges that GAN faces and the prospect of GAN.","PeriodicalId":178054,"journal":{"name":"2020 5th International Conference on Information Science, Computer Technology and Transportation (ISCTT)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134446452","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design and implementation of VDES Link Layer protocol applied to intelligent vessels 应用于智能船舶的VDES链路层协议的设计与实现
Liang Ma, Xin Sun, Jie Wen
{"title":"Design and implementation of VDES Link Layer protocol applied to intelligent vessels","authors":"Liang Ma, Xin Sun, Jie Wen","doi":"10.1109/ISCTT51595.2020.00079","DOIUrl":"https://doi.org/10.1109/ISCTT51595.2020.00079","url":null,"abstract":"In recent years, intelligent vessels have become a new hot issue in the international maritime field. As a next-generation maritime dedicated mobile communication system, VDES can meet the communication needs of intelligent vessels. According to the VDES protocol stack, the function of the VDES data link layer is analyzed, the VDES link layer protocol signaling procedures and its interfaces are designed, and the VDES link layer function is developed on the Linux platform by using the C language. The testing environment of VDES DLL protocol is built to verify the feasibility of the protocol. The design and implementation of the protocol provide a reliable transmission method for the communication of intelligent vessels, and give a reference for the development of VDES system.","PeriodicalId":178054,"journal":{"name":"2020 5th International Conference on Information Science, Computer Technology and Transportation (ISCTT)","volume":"101 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117260892","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Design and analysis of a new RFID Security Protocol for Internet of things 一种新的物联网RFID安全协议的设计与分析
Zixuan Liu, Jie Yu
{"title":"Design and analysis of a new RFID Security Protocol for Internet of things","authors":"Zixuan Liu, Jie Yu","doi":"10.1109/ISCTT51595.2020.00010","DOIUrl":"https://doi.org/10.1109/ISCTT51595.2020.00010","url":null,"abstract":"As the core of the third information revolution, the Internet of things plays an important role in the development of the times. According to the relevant investigation and research, we can find that the research on the Internet of things is still in the stage of LAN and private network, and its open advantages have not been fully utilized[1]. In this context, RFID technology as the core technology of the Internet of things, the security protocol plays an important role in the normal use of the technology. With the continuous development of Internet information technology, the disadvantages of security protocol become more and more obvious. These problems seriously affect the popularity of Internet of things technology. Therefore, in the future work, the relevant staff need to continue to strengthen research, according to the future development plan, effectively play the advantages of technology, and further promote its development.","PeriodicalId":178054,"journal":{"name":"2020 5th International Conference on Information Science, Computer Technology and Transportation (ISCTT)","volume":"215 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124235695","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信