{"title":"Design and Research of Underwater Communication Technology Based on LORA and PH Value and Salinity Sensor","authors":"Qian Deng, ChenluLi","doi":"10.1145/3501409.3501411","DOIUrl":"https://doi.org/10.1145/3501409.3501411","url":null,"abstract":"In order to develop and manage the ocean space, a series of ocean development support technologies are needed. Through the design of the LORA module principle andimplementation of the LORA module and the port design and research of PH and salinity sensors, this paper helps to build through links between these equipment and devices such as deep sea exploration, deep diving, marine remote sensing, marine navigation, as well as with shore-based, space-based and air-based command agencies to achieve effective information transmission.","PeriodicalId":191106,"journal":{"name":"Proceedings of the 2021 5th International Conference on Electronic Information Technology and Computer Engineering","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116350659","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Application analysis of computer web data mining technology in E-commerce","authors":"Hu Ju, Hui Wang","doi":"10.1145/3501409.3501626","DOIUrl":"https://doi.org/10.1145/3501409.3501626","url":null,"abstract":"With the development of the Internet, the proportion of e-commerce in people's life is becoming larger and larger. Online shopping has become a major way of shopping and helped people improve their life efficiency. Web data mining technology is a very important technology in e-commerce. The web can deeply mine and analyze the access methods, interest preferences, group characteristics and so on of e-commerce users. These information can help e-commerce push different user groups, and greatly improve the overall promotion effect and benefit of e-commerce. Starting from the web data mining technology, this paper expounds the application process of Web data mining technology used in e-commerce in detail, so as to provide a certain reference for the development of e-commerce.","PeriodicalId":191106,"journal":{"name":"Proceedings of the 2021 5th International Conference on Electronic Information Technology and Computer Engineering","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117053169","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on Thermal Impedance Modeling Method of IGBT Devices","authors":"Shuai Sun, Ronggang Han, Zhongkang Lin","doi":"10.1145/3501409.3501459","DOIUrl":"https://doi.org/10.1145/3501409.3501459","url":null,"abstract":"The thermal impedance model of IGBT device plays an important role in accurately analyzing the transient temperature change of IGBT device. Because it is relatively difficult to measure the internal temperature of packaged IGBT devices and it is difficult to obtain the chip junction temperature directly, it has certain advantages to study the temperature characteristics of IGBT by simulation. A method to establish the thermal resistance model of devices through the thermal impedance test data or datasheet is presented in this paper. Firstly, the medium thermal resistance of the device packaging material is calibrated based on the three-dimensional structure model and material parameters. Secondly, the contact thermal resistance of the device is calibrated combined with the steady-state thermal resistance test data. Finally, the transient thermal resistance model is calibrated by modifying the material parameters. In order to verify the accuracy of the model, thermal simulation analysis is carried out after each calibration to verify the effectiveness of the modeling method. The method described in this paper has good practical significance, and it can provide a useful reference for temperature field modeling technology and simulation technology of IGBT device.","PeriodicalId":191106,"journal":{"name":"Proceedings of the 2021 5th International Conference on Electronic Information Technology and Computer Engineering","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116736029","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Deepbug: Bug Injection in Depth","authors":"Wanli Shi, Guomiao Zhou, Zehui Wu, Huiyong Zhang","doi":"10.1145/3501409.3501538","DOIUrl":"https://doi.org/10.1145/3501409.3501538","url":null,"abstract":"There has been a lot of research devoted to finding real-world software bugs, but these studies have lacked some standard test sets as test subjects, especially in the area of synthetic bugs. Although studies such as LAVA and Apocalypse have now suggested ways to inject bugs into real software, these injected bugs are either a single type or the injection points are easily accessed by bug exploiters. In this paper, we propose a bug injection system Deepbug that combines path extraction and taint analysis, through which more hidden bugs can be injected into real software. In our experiments, using Deepbug to inject bugs into four existing open-source software, through fuzz testing of defective software, we found that only a small number of these injected bugs were found by fuzzing tools.","PeriodicalId":191106,"journal":{"name":"Proceedings of the 2021 5th International Conference on Electronic Information Technology and Computer Engineering","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114185786","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yang Zhang, Shaojia Feng, Xiaopin Yang, Wentao Xia, Tian Gao, Xiao Wang, Chan Li
{"title":"Optimal control strategy of three level STATCOM in weak power grid","authors":"Yang Zhang, Shaojia Feng, Xiaopin Yang, Wentao Xia, Tian Gao, Xiao Wang, Chan Li","doi":"10.1145/3501409.3501669","DOIUrl":"https://doi.org/10.1145/3501409.3501669","url":null,"abstract":"The line distance under weak power grid is long, the system capacity is large, and the grid impedance increases when the grid operation state changes, which leads to the instability and even shutdown of STATCOM. Therefore, this paper proposes an optimal control strategy for neutral point clamped (NPC) three-level STATCOM with fast response to line impedance. On the one hand, through the establishment of the mathematical model of the system, the operating characteristics of the system are analyzed; On the other hand, by introducing the disturbance term of PLL with line impedance, a system model suitable for weak power grid is established to study the influence of line impedance on the system, and a filter differential controller is used to quickly respond to line impedance to improve the robustness of the system. Finally, the effectiveness of the method is verified by simulation and experiment.","PeriodicalId":191106,"journal":{"name":"Proceedings of the 2021 5th International Conference on Electronic Information Technology and Computer Engineering","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115763228","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yan Long, Xinguang Li, Shuai Chen, Shenbin Zhang, Shanxian Ma, Ruisi Li
{"title":"An AHP-based Computer Evaluation Model for College Students English Pronunciation Quality","authors":"Yan Long, Xinguang Li, Shuai Chen, Shenbin Zhang, Shanxian Ma, Ruisi Li","doi":"10.1145/3501409.3501692","DOIUrl":"https://doi.org/10.1145/3501409.3501692","url":null,"abstract":"Different groups of English learners have different levels of spoken English, and the criteria used to evaluate their pronunciation should also be different. This paper introduces a method for determining the weights of computerized ratings of English pronunciation quality for university students using the Analytic Hierarchy Process (AHP). The indicators used for scoring are divided into two parts: firstly, basic pronunciation, including accuracy, intensity and speed; secondly, expression ability, including emotion, rhythm and intonation. The best weight for each indicator is calculated by the AHP method, and when the evaluation is carried out, the weighted sum of the scores of each indicator is calculated to obtain the final overall evaluation result. The paper concludes with an experiment to verify that the computer evaluation model of English pronunciation quality established in this way for university students is objective and valid.","PeriodicalId":191106,"journal":{"name":"Proceedings of the 2021 5th International Conference on Electronic Information Technology and Computer Engineering","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114192502","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Fine-grained Object Recognition based on Multi-Scale Destruction and Construction Learning","authors":"Jun Luo, Yingzhe Jiang, Jinyi Qiu","doi":"10.1145/3501409.3501625","DOIUrl":"https://doi.org/10.1145/3501409.3501625","url":null,"abstract":"With the development of image processing technology, how to effectively use computer vision technology for image classification has become an important research branch in the field of computer vision. Traditional image classification is to identify coarse-grained categories, such as using computer vision technology to distinguish meta-categories such as \"dog\", \"grape\" and \"bird\". In many practical applications, images need to be classified at a fine-grained level, such as distinguishing which subcategory the image belongs to in the \"dog\" category: \"husky\", \"Samoyed\" and \"Alaska\". Due to the characteristics of large intra-class differences and small inter-class differences in fine-grained image classification, fine-grained image classification has become a challenging research. This paper proposes multi-scale input (MS_DCL) and multi-scale detail boosting (MSDB_DCL) destruction and construction learning methods, so that the network can learn object and component-level discriminative information for fine-grained image classification. The experimental results show that MS_DCL is finer than other existing ones. The granular image classification method has higher recognition accuracy, and the test accuracy rate can reach 87.4% on the CUB200-2011 dataset.","PeriodicalId":191106,"journal":{"name":"Proceedings of the 2021 5th International Conference on Electronic Information Technology and Computer Engineering","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122030968","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Radar active jamming recognition based on time-frequency image classification","authors":"Jingyi Wang, Wen Dong, Zhi-yong Song","doi":"10.1145/3501409.3502153","DOIUrl":"https://doi.org/10.1145/3501409.3502153","url":null,"abstract":"Flexible active radar jamming has become one of the main threats in modern electronic warfare. Aiming at the problem of classifying and identifying active jamming patterns of towed decoy radar, this paper proposes a set of methods for classifying and identifying jamming time-frequency images based on deep learning. The content mainly includes: using short-time Fourier transform to obtain time-frequency images of six kinds of active interference under different interference signal ratios. Using ResNet network to realize the classification and recognition of different interferences. Through simulation analysis, the algorithm can still obtain better results under low interference-to-noise ratio.","PeriodicalId":191106,"journal":{"name":"Proceedings of the 2021 5th International Conference on Electronic Information Technology and Computer Engineering","volume":"54 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125742976","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Intelligent maneuver decision method of unmanned aerial vehicle","authors":"Huan Zhou, Xiaoyan Zhang, Chu Sun","doi":"10.1145/3501409.3501697","DOIUrl":"https://doi.org/10.1145/3501409.3501697","url":null,"abstract":"As the key link of airspace task execution, UAV maneuver decision-making is the core intelligence embodiment of UAV, which can best represent the intelligence of UAV \"brain\". This paper summarizes the intelligent maneuver decision-making methods of UAV. Firstly, the problem and application background of UAV intelligent maneuver decision-making are introduced. Then, the research status of maneuver decision-making methods at home and abroad is analyzed. Intelligent maneuver decision-making is divided into two aspects: maneuver decision-making based on game theory and artificial intelligence. Game theory focuses on differential game, matrix game and influence diagram, Artificial intelligence focuses on expert system, intelligent optimization theory and neural network. Finally, a new air combat intelligent maneuver decision-making method based on bird foraging search algorithm is designed and verified by simulation experiments. The summary of UAV intelligent maneuver decision-making methods will contribute to the innovative research in this field, so as to promote the rapid development of maneuver decision-making technology.","PeriodicalId":191106,"journal":{"name":"Proceedings of the 2021 5th International Conference on Electronic Information Technology and Computer Engineering","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128030265","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Investigation of 4500 V FRD Implanted from Cathode with Different Depths Using 1-D Varied Doping","authors":"Chen Gao, Yuehua Wu, Yueyang Liu, Xintian Zhou, Kesheng Wang, Zheng Zhong","doi":"10.1145/3501409.3501666","DOIUrl":"https://doi.org/10.1145/3501409.3501666","url":null,"abstract":"A 4500 V fast recovery diode (FRD) implanted from cathode with different depths using 1-D varied doping is investigated with SRIM, MATLAB and Sentaurus TCAD in this paper. The defect concentrations of FRDs caused by He ions implantation[1-4] from cathode with 100μm and 120 μm injection depths are defined with SRIM. Especially, the minimum value of minority carriers life time of 100 μm injection depth is outside the space charge region, whereas that of 120 μm injection depth is inside the space charge region. Then the corresponding lifetime profiles of both types of FRDs are calculated with MATLAB for simulation in the Sentaurus TCAD. The electrical parameters of the FRD with 100 μm injection depth, such as forward voltage drop, breakdown voltage, and reverse recovery characteristics, exhibit superior improvements than that of conventional 120 μm one. This phenomenon demonstrates that controlling the minimum lifetime of a minority carriers outside the space charge region will make the device have better performance, which provides a guidance for future diode research.","PeriodicalId":191106,"journal":{"name":"Proceedings of the 2021 5th International Conference on Electronic Information Technology and Computer Engineering","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126687788","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}