Proceedings of the 2021 5th International Conference on Electronic Information Technology and Computer Engineering最新文献

筛选
英文 中文
Dropping Fake Favorable Feedback for Better Sentiment Analysis 放弃虚假的有利反馈,以获得更好的情绪分析
Qiankun Su, Zhida Feng, Wujin Sun, Lizhen Chen
{"title":"Dropping Fake Favorable Feedback for Better Sentiment Analysis","authors":"Qiankun Su, Zhida Feng, Wujin Sun, Lizhen Chen","doi":"10.1145/3501409.3501672","DOIUrl":"https://doi.org/10.1145/3501409.3501672","url":null,"abstract":"Fake favorable feedback is a big obstacle for customers to get better experiences on shopping websites. As far as we know, the effects of fake favorable feedback on natural language processing models have not been reported. To investigate the distraction of fake feedback, this paper developed a method to resolute fake feedback (RFF). The proposed RFF first analyzes the tokenizes of feedback, and then several short texts are generated to replace some long texts. Experimental results on the raw data and processed data show the effectiveness of our proposal.","PeriodicalId":191106,"journal":{"name":"Proceedings of the 2021 5th International Conference on Electronic Information Technology and Computer Engineering","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115281633","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
FIRM: A Fused Information Re-optimization Method applied to the classification of defense science and technology indicators 企业:一种应用于国防科技指标分类的融合信息再优化方法
Chengyuan Duan, Jiajun Cheng, Huachi Xu, Hongliang You, Q. Gao, Yizhuo Rao
{"title":"FIRM: A Fused Information Re-optimization Method applied to the classification of defense science and technology indicators","authors":"Chengyuan Duan, Jiajun Cheng, Huachi Xu, Hongliang You, Q. Gao, Yizhuo Rao","doi":"10.1145/3501409.3501548","DOIUrl":"https://doi.org/10.1145/3501409.3501548","url":null,"abstract":"Recent years have witnessed a growing interest in applying few-shot learning algorithms to personalized recommendation, and text classification tasks. In this paper, we propose a Fused Information Re-optimization Method based few-shot learning algorithm (FIRM) which can realize the fusion of label description information and sample instances. With the fusion strategy, FIRM can fully use the commonality between categories, the characteristic information of each category, and training model parame-ters with both generalization ability and classification characteristics. Further, to evaluate the validity of the proposed algorithm on the defense domain, a few-shot dataset (i.e., the defense science and technology indicators dataset) is constructed. Experimental results on the dataset validate our proposal and indicate the superior capability in classification tasks than a prototype network and MAML. Our main contributions are: 1) A few-shot dataset in the field of defense science and technology is con-structed by manually extracting the indicators from a large number of defense science and technology project evaluation documents. 2) A method of fusing information re-optimization is proposed to solve the indicator few-shot classification problem. 3) The effectiveness of FIRM is verified through comparative experiments on the constructed dataset, against with the prototype network, MAML algorithm.","PeriodicalId":191106,"journal":{"name":"Proceedings of the 2021 5th International Conference on Electronic Information Technology and Computer Engineering","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115288543","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Predicting the Power Consumption and Operating Rate of Enterprises in Major Public Events 重大公共活动中企业用电量及开工率预测
Zheng Zhu, Yingjie Tian, Hongshan Yang
{"title":"Predicting the Power Consumption and Operating Rate of Enterprises in Major Public Events","authors":"Zheng Zhu, Yingjie Tian, Hongshan Yang","doi":"10.1145/3501409.3501575","DOIUrl":"https://doi.org/10.1145/3501409.3501575","url":null,"abstract":"The power consumption of enterprises in major public events may significantly different from non-event days, which brings new challenges for the existing power distribution system. Conventional approaches to predicting power consumption are mainly based on statistical learning methods, such as a particular fitted distribution, logistic regression, decision trees, etc. However, the customer's power behaviors change significantly during the major public events, which may lead to suboptimal performance for existing methods. To overcome these challenges, we propose a novel long and short-term memory-based attentional algorithm to accurately predict the power consumption and corresponding operating rate of enterprises in major public events. In particular, we firstly employ long term memory gate to learn the most important historical pattern and forget the irrelevant behaviors. Then, the short-term memory is leveraged to increase the importance of recent patterns. Lastly, compared with the conventional method that gives equal weights to different slices, we design an attentional prediction network to dynamically adjust the weights of long and short-term patterns. We optimize the proposed end-to-end deep learning model by standard stochastic gradient descent (SGD) algorithms.","PeriodicalId":191106,"journal":{"name":"Proceedings of the 2021 5th International Conference on Electronic Information Technology and Computer Engineering","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115311325","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Evaluation of Uncertainty in Rocket Sled Velocity Measurement Based on Hall Effect Sensor 基于霍尔效应传感器的火箭滑橇速度测量不确定度评定
Wei-wei Zhang, Jun Xiao, Qiang Geng, Qiang Xue, Linrui Zhang, Biao Guo
{"title":"Evaluation of Uncertainty in Rocket Sled Velocity Measurement Based on Hall Effect Sensor","authors":"Wei-wei Zhang, Jun Xiao, Qiang Geng, Qiang Xue, Linrui Zhang, Biao Guo","doi":"10.1145/3501409.3501439","DOIUrl":"https://doi.org/10.1145/3501409.3501439","url":null,"abstract":"The uncertainty of rocket sled velocity measurement system based on Hall effect sensor was evaluated. Based on the uncertainty theory, the uncertainty is evaluated from the sensor installation distance, repeatable position and trigger signal threshold, and the installation distance of 5m is calculated, the standard uncertainty and composite uncertainty of the velocity measurement system with a maximum velocity of 1000m/s show that the precision of the system can reach $pL 2m/s. The evaluation results can provide technical support for the construction of rocket sled speed measurement system based on Hall effect sensor.","PeriodicalId":191106,"journal":{"name":"Proceedings of the 2021 5th International Conference on Electronic Information Technology and Computer Engineering","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114677752","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Adaptive Neural Network Fault Tolerant Control for a Hydraulic System 液压系统的自适应神经网络容错控制
Bohao Li, Dong Cheng, Xiaorui Zong, Haijie Jia
{"title":"Adaptive Neural Network Fault Tolerant Control for a Hydraulic System","authors":"Bohao Li, Dong Cheng, Xiaorui Zong, Haijie Jia","doi":"10.1145/3501409.3501535","DOIUrl":"https://doi.org/10.1145/3501409.3501535","url":null,"abstract":"An adaptive control allocation method based on RBF neural network is proposed for a class of hydraulic systems. The goal of this method is to eliminate the output error. Firstly, the actuator fault model of hydraulic systems is established based on the Lyapunov stability principle, an improved adaptive neural network fault-tolerant controller is designed. The simulation results show that the controller has better control performance in the case of partial or combined faults in hydraulic system, can quickly implement fault-tolerant control.","PeriodicalId":191106,"journal":{"name":"Proceedings of the 2021 5th International Conference on Electronic Information Technology and Computer Engineering","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116984789","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Safe operation and maintenance management and control technology based on grade protection 2.0 基于等级保护2.0的安全运维管控技术
Yue Sun, Wei Chen, Qinglin Yuan, Yin Yuan
{"title":"Safe operation and maintenance management and control technology based on grade protection 2.0","authors":"Yue Sun, Wei Chen, Qinglin Yuan, Yin Yuan","doi":"10.1145/3501409.3501468","DOIUrl":"https://doi.org/10.1145/3501409.3501468","url":null,"abstract":"With the rapid development of technologies such as the Internet of Things and 5G communications, the intelligent era of the Internet of Everything is accelerating. This situation poses a huge challenge to the currently widely used cloud computing model. Edge computing is a new computing model that provides intelligent services at the edge of the network close to the source of things or data. It can save network traffic, improve response speed and protect user privacy. It shows better performance than cloud computing in IoT applications, has been highly concerned and unanimously recognized by the industry and academia. With the rapid development of my country's economy, information-based production tools have entered all aspects of people's work and life such as industry, agriculture, commerce, medical care, education, etc., and online commerce, online banking, and online medical services that involve personal private information. Services are increasing, and national military and political intelligence is transmitted more frequently through the Internet. Under this circumstance, ensuring the security of information has increasingly become the most urgent problem that needs to be solved quickly in today's society. It is occupies the most important position in the national industrial layout and even the national security strategy pattern. In this context, with \"Grade protection 2.0\" as the standard, the core content of \"Grade protection 2.0\" is \"one center, triple protection\". That is to build a security management center, do a good job in the protection of the computing environment, regional boundaries and communication networks, and form a comprehensive network security defense system.","PeriodicalId":191106,"journal":{"name":"Proceedings of the 2021 5th International Conference on Electronic Information Technology and Computer Engineering","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117125295","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Credibility Evaluation Method for Multidimensional Uncertain Interval Data based on the Evidence Theory 基于证据理论的多维不确定区间数据可信度评估方法
Suike Li, Yongchao Zhao, Haijun Wang
{"title":"Credibility Evaluation Method for Multidimensional Uncertain Interval Data based on the Evidence Theory","authors":"Suike Li, Yongchao Zhao, Haijun Wang","doi":"10.1145/3501409.3501511","DOIUrl":"https://doi.org/10.1145/3501409.3501511","url":null,"abstract":"Aiming at the credibility of multi-dimensional uncertain interval data, an evaluation method based on evidence theory is established. Firstly, the subjective probability distribution and calculation method based on evidence theory are given. Then, the description method of evidence theory is introduced into multi-dimensional uncertain interval data to obtain the description of probability distribution. Furthermore, according to the evidential reasoning method, the probability of multi-dimensional uncertain interval data is comprehensively calculated to evaluate the credibility of the data. Finally, an example is given to verify the feasibility and effectiveness of the proposed method","PeriodicalId":191106,"journal":{"name":"Proceedings of the 2021 5th International Conference on Electronic Information Technology and Computer Engineering","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121025934","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Intra-Pulse Feature Extraction of Radar Emitter Signals Based on Complex Network 基于复杂网络的雷达发射信号脉冲内特征提取
Yiming Ma, Taowei Chen, Huiyuan Wang, Jian Hu, Jingyi Wang, Chao Peng
{"title":"Intra-Pulse Feature Extraction of Radar Emitter Signals Based on Complex Network","authors":"Yiming Ma, Taowei Chen, Huiyuan Wang, Jian Hu, Jingyi Wang, Chao Peng","doi":"10.1145/3501409.3501521","DOIUrl":"https://doi.org/10.1145/3501409.3501521","url":null,"abstract":"The electromagnetic signal environment of the modern battlefield is complex. The radar signal recognition technology based on the traditional five parameters cannot meet the actual needs. For this reason, it is urgent to explore new identification methods to improve the technical level of existing radar countermeasure equipment in electronic warfare. Aiming at the research challenge of low-accuracy intra-pulse waveform recognition in a dense modern electronic warfare environment, In this paper, we propose a new method to extract the characteristics of radar emission signals. This method first reconstructs the radar transmitter signal into a complex network, and then extracts the characteristics of the complex network. In our algorithm, the features are extracted from network topology statistics with each vector point of the reconstructed phase space represented by a single node and edge determined by the phase space distance. Through analyzing the global properties of network nodes, we found that the network constructed by the method described in this article inherited the dynamic characteristics of all aspects of the intentional intra-pulse modulation type of radar signals in time domain. Furthermore, we investigate the stability and sensibility of feature parameters with the variation range from 5dB to 20dB. Computer simulation demonstrates how the topological indices of the network can be used to distinguish different modulation types of radar emitter signals. At the same time, the experimental results show that the extracted feature vectors have good ability of noise-resistance and good clustering quality in low SNR environment when the radar signals are corrupted by measurement noise.","PeriodicalId":191106,"journal":{"name":"Proceedings of the 2021 5th International Conference on Electronic Information Technology and Computer Engineering","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124855141","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Construction and Optimization of Emergency Prediction Model based on random Forest algorithm 基于随机森林算法的应急预测模型构建与优化
Xiang Chen, Siyuan Gong
{"title":"Construction and Optimization of Emergency Prediction Model based on random Forest algorithm","authors":"Xiang Chen, Siyuan Gong","doi":"10.1145/3501409.3501707","DOIUrl":"https://doi.org/10.1145/3501409.3501707","url":null,"abstract":"Based on the massive emergency data set, the emergency early warning model is established by using machine learning method to predict the realization risk of emergency attack target, and the importance characteristics of emergency early warning can be found. The 135-dimensional emergency features are screened, normalized, single thermal coding and chi-square test. Random forest algorithm and other machine learning algorithms are tested and evaluated. It is proved that random forest algorithm is better than other machine learning algorithms in performance. Based on the global emergency data from 2001 to 2019, this paper uses the random forest algorithm to reduce the dimension of the factors affecting the number of emergency casualties, selects the more important event characteristics, and forecasts the number of emergency casualties in the target country. finally, the international community overseas investment risk assessment and emergency early warning model construction optimization.","PeriodicalId":191106,"journal":{"name":"Proceedings of the 2021 5th International Conference on Electronic Information Technology and Computer Engineering","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125127113","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Relationship between Packaging Structures, Chip Area and Thermal Resistance of NMOS Semiconductor in Transient Dual Interface Method 瞬态双界面法中NMOS半导体封装结构、芯片面积与热阻的关系
Fan Chen, Dapeng Liu, Long Chen, Shuai Tao, Jun You, Zebin Kong
{"title":"The Relationship between Packaging Structures, Chip Area and Thermal Resistance of NMOS Semiconductor in Transient Dual Interface Method","authors":"Fan Chen, Dapeng Liu, Long Chen, Shuai Tao, Jun You, Zebin Kong","doi":"10.1145/3501409.3501417","DOIUrl":"https://doi.org/10.1145/3501409.3501417","url":null,"abstract":"This paper summarizes the relationship between packaging structures, chip area and junction-to-case thermal resistance (Rthjc) of XX NMOS semiconductor in transient dual interface (TDI) method: (1)The Rthjc of this NMOS transistor is determined to be 0.48K/W directly from the separation of transient thermal resistance Zth curves. The influence of each packaging structure on Rthjc is then analyzed with cumulative and differential structure functions. The Rthjc mainly contains thermal resistance of PN junction, Sn-based solders, BeO ceramic and metal case. The thermal resistance of this NMOS is relatively small compared with that of other NMOS devices. (2)Chip area A can be calculated with heating power, chip thermal parameters and slope of transient initial junction temperature curves. The larger the slope of initial junction temperature curves, the smaller the chip area A. (3)With the same packaging structures, the smaller the chip area A, the larger the thermal resistance Rthjc.","PeriodicalId":191106,"journal":{"name":"Proceedings of the 2021 5th International Conference on Electronic Information Technology and Computer Engineering","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123335806","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信