2019 IEEE 3rd Information Technology, Networking, Electronic and Automation Control Conference (ITNEC)最新文献

筛选
英文 中文
Knowledge Representation Model for Evolution of Crowd Evacuation Stability 人群疏散稳定性演化的知识表示模型
R. Zhao, Qiong Liu, Cuiling Li, Daheng Dong, Qianshan Hu, Yunlong Ma, Qin Zhang
{"title":"Knowledge Representation Model for Evolution of Crowd Evacuation Stability","authors":"R. Zhao, Qiong Liu, Cuiling Li, Daheng Dong, Qianshan Hu, Yunlong Ma, Qin Zhang","doi":"10.1109/ITNEC.2019.8728986","DOIUrl":"https://doi.org/10.1109/ITNEC.2019.8728986","url":null,"abstract":"In large-scale crowd evacuation, it is necessary to make reasonable and quick decision to organize the crowd evacuation based on the large amount of crowd evacuation data. Obviously, knowledge representation for the evolutionary mechanism of crowd evacuation stability is the first step during the crowd evacuation decision-making. In this paper, we propose a novel knowledge representation model for the evolution mechanism of crowd stability state. We use the principle of self-organizing mapping network to discretize the characteristics of crowd evacuation scenarios and stability state evolution. Using discretized variables, a two-dimensional condition-decision information table is formed based on the representation paradigm of rough set. Furthermore, the hidden relationship between the features of crowd trampling scenarios and the evolutionary characteristics of the stability state can be more effectively analyzed and obtained, which provides scientific basis for the intelligent decision-making of crowd evacuation.","PeriodicalId":202966,"journal":{"name":"2019 IEEE 3rd Information Technology, Networking, Electronic and Automation Control Conference (ITNEC)","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128734508","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
CNN-Based End-To-End Language Identification 基于 CNN 的端到端语言识别
Yutian Wang, Huan Zhou, Zheng Wang, Jingling Wang, Hui Wang
{"title":"CNN-Based End-To-End Language Identification","authors":"Yutian Wang, Huan Zhou, Zheng Wang, Jingling Wang, Hui Wang","doi":"10.1109/ITNEC.2019.8729388","DOIUrl":"https://doi.org/10.1109/ITNEC.2019.8729388","url":null,"abstract":"Recently, language identification (LID) on long utterances has archived very low error rate, however, it is still a challenging task under short-duration condition. In this paper, we propose an end-to-end short-duration language identification system based on deep convolutional neural network (DCNN), where the whole network is trained with multi-class cross-entroy loss. Besides, we compare three kinds of input features: Mel-Frequency Cepstral Coefficients (MFCC), log Mel-scale Filter Bank energies (FBANK) and spectrogram energies. The experimental results indicate that spectrogram energies achieves the best performance among them In order to enhance the robustness of system, at the training stage, the databases are augmented by applying time-scale modification (TSM) method. Based on APl 7-OLR databases, under 1-second condition, the proposed system has improved 32.7% than traditional i-vector system, and compared with other neural network systems, it peforms equally well and even better.","PeriodicalId":202966,"journal":{"name":"2019 IEEE 3rd Information Technology, Networking, Electronic and Automation Control Conference (ITNEC)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126322641","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Forecasting stock prices in two ways based on LSTM neural network 基于LSTM神经网络的两种股票价格预测方法
Jingyi Du, Qingli Liu, Kang Chen, Jiacheng Wang
{"title":"Forecasting stock prices in two ways based on LSTM neural network","authors":"Jingyi Du, Qingli Liu, Kang Chen, Jiacheng Wang","doi":"10.1109/ITNEC.2019.8729026","DOIUrl":"https://doi.org/10.1109/ITNEC.2019.8729026","url":null,"abstract":"Due to the extensive application of deep learning in processing time series and recent progress, LSTM (Long Short-Term Memory) neural network is the most commonly used and most powerful tool for time series models. The LSTM neural network is used to predict Apple stocks by using single feature input variables and multi-feature input variables to verify the prediction effect of the model on stock time series. The experimental results show that the model has a high accuracy of 0.033 for the multivariate input and is accurate, which is in line with the actual demand. For the univariate feature input, the predicted squared absolute error is 0.155, which is inferior to the multi-feature variable input.","PeriodicalId":202966,"journal":{"name":"2019 IEEE 3rd Information Technology, Networking, Electronic and Automation Control Conference (ITNEC)","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114601534","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
Kinematics analysis and trajectory planning of 6-DOF robot 六自由度机器人运动学分析与轨迹规划
Xuesong Zheng, Yujie Zheng, Y. Shuai, Jiping Yang, Shuang Yang, Ye Tian
{"title":"Kinematics analysis and trajectory planning of 6-DOF robot","authors":"Xuesong Zheng, Yujie Zheng, Y. Shuai, Jiping Yang, Shuang Yang, Ye Tian","doi":"10.1109/ITNEC.2019.8729280","DOIUrl":"https://doi.org/10.1109/ITNEC.2019.8729280","url":null,"abstract":"With the large-scale development of Intelligent Manufacturing in China, robot technology has been widely applied in the industrial field. Aiming at the motion of six-degree-of-freedom robot, the structure and link parameters of the robot are analyzed, and the forward/reverse kinematics model of the robot is deduced by D-H parameter method. Through the simulation of trajectory planning, the angle, angular velocity and angular acceleration of the 6-DOF robot in the process of motion are analyzed.","PeriodicalId":202966,"journal":{"name":"2019 IEEE 3rd Information Technology, Networking, Electronic and Automation Control Conference (ITNEC)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133860665","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Android software vulnerability mining framework based on dynamic taint analysis technology 基于动态污点分析技术的Android软件漏洞挖掘框架
Zhao Min, Yang Haimin, Chen Ping, Yang Zhengxing
{"title":"Android software vulnerability mining framework based on dynamic taint analysis technology","authors":"Zhao Min, Yang Haimin, Chen Ping, Yang Zhengxing","doi":"10.1109/ITNEC.2019.8729217","DOIUrl":"https://doi.org/10.1109/ITNEC.2019.8729217","url":null,"abstract":"Security vulnerability mining is at the core of Android system security research. How to effectively exploit Android system security vulnerabilities has become an important technical means to enhance the security of smartphones and protect user security and privacy. An Android software vulnerability mining framework based on dynamic taint analysis technology is designed in this paper. Firstly, it analyzes the shortcomings of existing vulnerability mining technology, then gives the detailed design of the framework, and then discusses in detail the taint propagation analysis under Java context. Complete the switching between Java context and native context taint analysis environment at runtime, instruction preprocessing and other key techniques of Android vulnerability mining based on dynamic taint analysis theory. Finally, summarizes the whole paper and puts forward the problem worthy of further study.","PeriodicalId":202966,"journal":{"name":"2019 IEEE 3rd Information Technology, Networking, Electronic and Automation Control Conference (ITNEC)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130052256","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Summary of Research on IT Network and Industrial Control Network Security Assessment IT网络与工控网络安全评估研究综述
Lei Hu, Hailong Li, Zhenhua Wei, Siqi Dong, Zhao Zhang
{"title":"Summary of Research on IT Network and Industrial Control Network Security Assessment","authors":"Lei Hu, Hailong Li, Zhenhua Wei, Siqi Dong, Zhao Zhang","doi":"10.1109/ITNEC.2019.8729052","DOIUrl":"https://doi.org/10.1109/ITNEC.2019.8729052","url":null,"abstract":"The difference between traditional IT network and industrial control network determines the different methods of network security assessment. In the face of increasingly serious cybersecurity status, network security assessment research faces new challenges. This paper compares the composition, function and possible damage of IT network and industrial control network, and discusses the existing standards and key technologies related to IT network and industrial control network security assessment. It analyzes the challenges faced by the security assessment of the two networks and looks forward to future research.","PeriodicalId":202966,"journal":{"name":"2019 IEEE 3rd Information Technology, Networking, Electronic and Automation Control Conference (ITNEC)","volume":"124 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128151517","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Hybrid WSN Node Deployment optimization Strategy Based on CS Algorithm 基于CS算法的混合WSN节点部署优化策略
Tingli Xiang, Hongiun Wang, Yingchun Shi
{"title":"Hybrid WSN Node Deployment optimization Strategy Based on CS Algorithm","authors":"Tingli Xiang, Hongiun Wang, Yingchun Shi","doi":"10.1109/ITNEC.2019.8729481","DOIUrl":"https://doi.org/10.1109/ITNEC.2019.8729481","url":null,"abstract":"The performance of wireless sensor network (WSN) system is significantly affected by the coverage quality. For the problem of low coverage of static sensor network nodes and high deployment cost of mobile sensor network nodes, a hybrid sensor network based on cuckoo search (CS) is studied. Node deployment optimization strategy. Firstly, the candidate target position of the mobile node is initially determined by the CS algorithm, and then the position optimization scheme is used to reduce the number of mobile nodes and the average moving distance. The experimental results show that the proposed algorithm can effectively optimize the deployment of mobile nodes in hybrid WSN, improve the coverage of target areas, and reduce the energy consumption of nodes.","PeriodicalId":202966,"journal":{"name":"2019 IEEE 3rd Information Technology, Networking, Electronic and Automation Control Conference (ITNEC)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129605597","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Research on Cross Language Text Keyword Extraction Based on Information Entropy and TextRank 基于信息熵和TextRank的跨语言文本关键字提取研究
Xiaoyu Zhang, Yongbin Wang, Lin Wu
{"title":"Research on Cross Language Text Keyword Extraction Based on Information Entropy and TextRank","authors":"Xiaoyu Zhang, Yongbin Wang, Lin Wu","doi":"10.1109/ITNEC.2019.8728993","DOIUrl":"https://doi.org/10.1109/ITNEC.2019.8728993","url":null,"abstract":"In order to extract keywords from cross-language documents as accurately as possible, especially for the language whose keyword extraction technology is not mature, a text keyword extraction method based on information entropy and TextRank is proposed to extract the accurate keywords from the translated Chinese documents. This method determines the basic importance of words according to the information entropy of words, and then uses the information entropy of words to vote iteratively through the TextRank algorithm. This method solves the problem that TextRank algorithm easily extracts frequent non key words as keywords. The experimental results show that the proposed method can extract keywords more accurately than TextRank in the processing of cross-lingual bilingual translated documents.","PeriodicalId":202966,"journal":{"name":"2019 IEEE 3rd Information Technology, Networking, Electronic and Automation Control Conference (ITNEC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116303688","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Recognizing Small-Sample Biomedical Named Entity Based on Contextual Domain Relevance 基于上下文域关联的小样本生物医学命名实体识别
Shun Zhang, Shaofu Lin, Jiangfan Gao, Jianhui Chen
{"title":"Recognizing Small-Sample Biomedical Named Entity Based on Contextual Domain Relevance","authors":"Shun Zhang, Shaofu Lin, Jiangfan Gao, Jianhui Chen","doi":"10.1109/ITNEC.2019.8729015","DOIUrl":"https://doi.org/10.1109/ITNEC.2019.8729015","url":null,"abstract":"Existing named entity recognition methods are often based on large training samples and cannot effectively recognize fine-grained domain entities with small sample sizes In order to solve this problem, this paper proposes an unsupervised method based on contextual domain relevance for recognizing biomedical named entities with small sample sizes. Based on the distributed semantic model, the statistical and linguistic features of candidate entities in corpora are described by using occurrence frequencies of contexts of candidate entities. Furthermore, the entity-corpus relevance assumption, the log-likelihood ratio and the domain-dependent function are adopted for recognizing objective entities. Experimental results show that, the proposed method can effectively reduce manual interventions and improve the precision rate and recall rate of small-sample biomedical named entity recognition.","PeriodicalId":202966,"journal":{"name":"2019 IEEE 3rd Information Technology, Networking, Electronic and Automation Control Conference (ITNEC)","volume":"107 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116399536","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Macroscopic crowd panic quantification model of crowd evacuation based on information entropy 基于信息熵的人群疏散宏观人群恐慌量化模型
R. Zhao, Qianshan Hu, Cuiling Li, Daheng Dong, Qiong Liu, Yunlong Ma, Qin Zhang
{"title":"Macroscopic crowd panic quantification model of crowd evacuation based on information entropy","authors":"R. Zhao, Qianshan Hu, Cuiling Li, Daheng Dong, Qiong Liu, Yunlong Ma, Qin Zhang","doi":"10.1109/ITNEC.2019.8729160","DOIUrl":"https://doi.org/10.1109/ITNEC.2019.8729160","url":null,"abstract":"To solve the existing problem that panic impact on crowd evacuation is less quantitatively considered at the crowd evacuation model, this contribution proposes a panic quantification model based on Aw-Rascle. This model introduces information entropy in information theory to reflect the degree of confusion in crowds, and maps individual velocity distribution into information entropy graph. The information entropy graph reflects the degree of panic for certain time in the entire evacuation space. To validate the panic propagation model, numerical simulation is conducted based on a case study of the Mecca Hajj stampede in 2015. The simulation results show that when the number of people increases, the degree of crowd panic increases, making the evacuation process more chaotic and the information entropy value increasing.","PeriodicalId":202966,"journal":{"name":"2019 IEEE 3rd Information Technology, Networking, Electronic and Automation Control Conference (ITNEC)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134171003","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信