Jingyu Song, Bo Chen, Xueliang Li, Yezhou Yang, Chang Liu, Haifeng Li
{"title":"The software fault prediction model based on the AltaRica language","authors":"Jingyu Song, Bo Chen, Xueliang Li, Yezhou Yang, Chang Liu, Haifeng Li","doi":"10.1109/ITNEC.2019.8729235","DOIUrl":"https://doi.org/10.1109/ITNEC.2019.8729235","url":null,"abstract":"Many existing software fault prediction methods are difficult to identify and predict various complex faults such as the abnormal interface data, the concurrency conflict between functions, and the invalid state transition. To solve this problem, a new software fault prediction model based on AltaRica language is proposed in this paper based on the AltaRica language and the Line Temporal Logic (LTL) with the operation characters of the airborne support system. The experimental results show that this new model can improve the effectiveness and applicability of the fault prediction methods which can describe the operation characters of the airborne support system software accurately and identify the complex faults adequately.","PeriodicalId":202966,"journal":{"name":"2019 IEEE 3rd Information Technology, Networking, Electronic and Automation Control Conference (ITNEC)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123154510","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A rumor propagation model based on content trust","authors":"Meiling Jin, Fengming Liu","doi":"10.1109/ITNEC.2019.8729539","DOIUrl":"https://doi.org/10.1109/ITNEC.2019.8729539","url":null,"abstract":"With the development of network technology, the rumors of network rumors are getting more and more serious, and the spread of network rumors has become a research hotspot. Firstly, based on the content characteristics of the information, this paper combines the three characteristics of rumors: subject universality, impact severity and event ambiguity, and establishes a content trust function. Secondly, the micro-Markov chain approximation method is used to establish the discreteness of rumor communication. The model, continuity model and continuous model based on trust function, and then calculate the corresponding rumor propagation threshold. Finally, through numerical simulation, the validity of the three properties of rumors is verified, and the validity of the model is proved. Good suppression of rumor spread.","PeriodicalId":202966,"journal":{"name":"2019 IEEE 3rd Information Technology, Networking, Electronic and Automation Control Conference (ITNEC)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121782063","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Hu Huang, Peng Huang, Sha Zhong, Tianyao Long, Songmin Wang, Enchao Qiang, Ya Zhong, Lei He
{"title":"Dynamic Path Planning Based on Improved D* Algorithms of Gaode Map","authors":"Hu Huang, Peng Huang, Sha Zhong, Tianyao Long, Songmin Wang, Enchao Qiang, Ya Zhong, Lei He","doi":"10.1109/ITNEC.2019.8729438","DOIUrl":"https://doi.org/10.1109/ITNEC.2019.8729438","url":null,"abstract":"To solve the problem of long-distance path planning for outdoor robots, an improved $D^{ast}$ algorithm combing with Gaode map based on vector model is proposed. Specifically, the global static path to the target point is planned through the Gaode Map Open Platform, and is divided into path sub-nodes. The dynamic $D^{ast}$ algorithm of heuristic function h(n) is improved under the vector model, and the long-distance path planning is realized by node iterations. The simulation is carried out on Gazebo and Rviz platforms. Results show that compared with the traditional $D^{ast}$ algorithm, the running time of the robot is reduced by 32.8%, the number of corners is reduced by 64.6%, the number of dead zones is reduced by 64.3%, and the success rate of the planned path to the target point is greatly improved, which has high feasibility.","PeriodicalId":202966,"journal":{"name":"2019 IEEE 3rd Information Technology, Networking, Electronic and Automation Control Conference (ITNEC)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127791773","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analysis of Weather and Exercise Steps Based on LSTM Neural Network","authors":"Chengcheng Guo, Rongheng Lin","doi":"10.1109/ITNEC.2019.8729294","DOIUrl":"https://doi.org/10.1109/ITNEC.2019.8729294","url":null,"abstract":"The analysis of exercise and health has become a hot issue that people are paying attention to today. This paper presents an automated method for the complete analysis of weather and air quality and daily exercise volume (number of steps). Firstly, a clustering method based on Fourier transform is used to separate users of different exercise styles, and then the LSTM neural network is used to train the step data and the corresponding weather and air quality data to find the correlation. After testing the real data with multiple exercise styles, the validity of this analysis method can be confirmed. At the same time, the training verification time of the model is also collected, which proves that it has certain advantages in the analysis of large-scale data.","PeriodicalId":202966,"journal":{"name":"2019 IEEE 3rd Information Technology, Networking, Electronic and Automation Control Conference (ITNEC)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116562019","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Simple Review of Audio Steganography","authors":"Dingwei Tan, Yuliang Lu, Xuehu Yan, Xiaoping Wang","doi":"10.1109/ITNEC.2019.8729476","DOIUrl":"https://doi.org/10.1109/ITNEC.2019.8729476","url":null,"abstract":"Stegnography is very important because it conceals the existence of communication itself. Nowadays, people use a variety of multimedia files as stegnography carriers. Recently, audio as a type of stegnography carrier has attracted more and more attention because of its unique characteristics. The growing popularity of VOIP has also pushed audio into more applications. Audio information hiding technology has its strengths and weaknesses. This paper begins with a brief introduction of basic stegnography methods. Then, the related evaluation indexes of audio stegnography are introduced. Next, the papar summarizes the performance of main audio stegnograhy methods. Finally, the paper concludes with recommendations and puts forward suggestions for the coming research focus.","PeriodicalId":202966,"journal":{"name":"2019 IEEE 3rd Information Technology, Networking, Electronic and Automation Control Conference (ITNEC)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114870964","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on Joint Space Trajectory Planning of SCARA Robot Based on SimMechanics","authors":"Cheng Zhang, Zhuo Zhang","doi":"10.1109/ITNEC.2019.8729547","DOIUrl":"https://doi.org/10.1109/ITNEC.2019.8729547","url":null,"abstract":"Aiming at the problem of multi-positon solution and trajectory planning optimization of SCARA robot, the kinematics model of SCARA robot is established based on D-H method. According to the two attitude solutions of upper and lower elbows after the robot passes through the singular point, two groups of trajectory planning are obtained by polynomial interpolation method based on joint space. The 3D Solidworks model of SCARA robot is imported into SimMechanics to carry out the trajectory planning experiment. By comparing the experimental data of trajectory planning under upper and lower elbow pose solutions, the feasibility of the optimal selection method of joint angle integral summation in trajectory planning of SCAR robot is verified.","PeriodicalId":202966,"journal":{"name":"2019 IEEE 3rd Information Technology, Networking, Electronic and Automation Control Conference (ITNEC)","volume":"279 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123716097","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Bistatic ISAR Sparse Aperture High Resolution Imaging Algorithm based on ROMP Algorithm","authors":"Wenhua Hu, Xiaoxiu Zhu, B. Guo, D. Xue","doi":"10.1109/ITNEC.2019.8729445","DOIUrl":"https://doi.org/10.1109/ITNEC.2019.8729445","url":null,"abstract":"To solve the problems of low resolution and serious energy leakage when using the traditional Range-Doppler (RD) algorithm to achieve bistatic ISAR imaging, a bistatic ISAR sparse aperture high resolution imaging algorithm based on ROMP algorithm is proposed. Firstly, a bistatic ISAR sparse aperture imaging model based on compressed sensing is established. Secondly, the ROMP algorithm is used to realize bistatic ISAR high resolution imaging. Finally, the effectiveness and superiority of the proposed algorithm is verified by the simulation experiment.","PeriodicalId":202966,"journal":{"name":"2019 IEEE 3rd Information Technology, Networking, Electronic and Automation Control Conference (ITNEC)","volume":"95 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124629571","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Harmonic Suppression For Low Speed Sensorless Control of SPMSM Based on High Voltage Frequency Pulsating Signal Injection","authors":"Hu Xiang-hui, Han Cen-Cen","doi":"10.1109/ITNEC.2019.8729518","DOIUrl":"https://doi.org/10.1109/ITNEC.2019.8729518","url":null,"abstract":"Ordinarily, at zero and low speed, the rotor position information for surface-mounted permanent magnet synchronous motor (PMSM) without any position sensor is obtained by the high frequency pulsating voltage signal injection, and there are position detection harmonic errors caused by non-ideal factors such as inverter nonlinear factors and current detection errors in practical applications. Firstly, the origin of the error is analyzed and the specific expression is given. Secondly, a rotor position observer based on the second order generalized integrator (SOGI) and notch filter is proposed. The SOGI is used to extract the high-frequency components, and then the notch filter is used to eliminate the harmonic errors. Finally, the simulation results indicate that the proposed method can effectively eliminate the harmonic errors in position estimation and ameliorate the performance of sensorless control.","PeriodicalId":202966,"journal":{"name":"2019 IEEE 3rd Information Technology, Networking, Electronic and Automation Control Conference (ITNEC)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129938338","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"CNN Model Design of Gesture Recognition Based on Tensorflow Framework","authors":"Zixian Zeng, Qingge Gong, Jun Zhang","doi":"10.1109/ITNEC.2019.8729185","DOIUrl":"https://doi.org/10.1109/ITNEC.2019.8729185","url":null,"abstract":"The paper uses Google newest open-source Tensorflow framework to build the model of gesture recognition, introduces the platform characteristics of Tensorflow, and puts forward a convolution network model based on Tensorflow framework. The experiment is designed with the combination of recognized dataset and self-collected dataset. The experimental results show that the model has high recognition accuracy, high computational efficiency, strong robustness, and can easily adjust the network structure, find the optimal model quickly, and accomplish the task of gesture recognition better.","PeriodicalId":202966,"journal":{"name":"2019 IEEE 3rd Information Technology, Networking, Electronic and Automation Control Conference (ITNEC)","volume":"249 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124741755","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design of An Improved Ethernet AVB Model for Real-time Communication in In-Vehicle Network","authors":"Xiaoyun Liu, Zhenbang Nie, Dong Li, Haibin Yu","doi":"10.1109/ITNEC.2019.8729189","DOIUrl":"https://doi.org/10.1109/ITNEC.2019.8729189","url":null,"abstract":"The amount of traffics is increasing rapidly due to the increase of the number of electronic components and vehicle applications in vehicles. They require more network bandwidth and more stringent end-to-end latency and jitter constraints. In this situation, IEEE Audio/Video Bridging (AVB) is expected to be a promising technology in In-Vehicle Network since it guarantees high level of Quality of Service (QoS) for real-time communication. AVB defined tow SR-Classes for time sensitive traffics. However, as a result of the complexity of stream reservation domain construction, in-vehicle networks tend to use single traffic classes. In addition, the AVB jitter constraint is too weak. In this paper, an improved Ethernet AVB model with single SR-Class and time-triggered scheduling is proposed. In this model, time-sensitive traffics with high jitter requirements are forwarded through time-triggered scheduling, and ordinary time-sensitive flows are forwarded using SR-Class. Through simulations we confirm that proposed model not only satisfies the Qos requirements, but also has some extra advantages.","PeriodicalId":202966,"journal":{"name":"2019 IEEE 3rd Information Technology, Networking, Electronic and Automation Control Conference (ITNEC)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123087861","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}