{"title":"Knowledge Representation Model for Evolution of Crowd Evacuation Stability","authors":"R. Zhao, Qiong Liu, Cuiling Li, Daheng Dong, Qianshan Hu, Yunlong Ma, Qin Zhang","doi":"10.1109/ITNEC.2019.8728986","DOIUrl":"https://doi.org/10.1109/ITNEC.2019.8728986","url":null,"abstract":"In large-scale crowd evacuation, it is necessary to make reasonable and quick decision to organize the crowd evacuation based on the large amount of crowd evacuation data. Obviously, knowledge representation for the evolutionary mechanism of crowd evacuation stability is the first step during the crowd evacuation decision-making. In this paper, we propose a novel knowledge representation model for the evolution mechanism of crowd stability state. We use the principle of self-organizing mapping network to discretize the characteristics of crowd evacuation scenarios and stability state evolution. Using discretized variables, a two-dimensional condition-decision information table is formed based on the representation paradigm of rough set. Furthermore, the hidden relationship between the features of crowd trampling scenarios and the evolutionary characteristics of the stability state can be more effectively analyzed and obtained, which provides scientific basis for the intelligent decision-making of crowd evacuation.","PeriodicalId":202966,"journal":{"name":"2019 IEEE 3rd Information Technology, Networking, Electronic and Automation Control Conference (ITNEC)","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128734508","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yutian Wang, Huan Zhou, Zheng Wang, Jingling Wang, Hui Wang
{"title":"CNN-Based End-To-End Language Identification","authors":"Yutian Wang, Huan Zhou, Zheng Wang, Jingling Wang, Hui Wang","doi":"10.1109/ITNEC.2019.8729388","DOIUrl":"https://doi.org/10.1109/ITNEC.2019.8729388","url":null,"abstract":"Recently, language identification (LID) on long utterances has archived very low error rate, however, it is still a challenging task under short-duration condition. In this paper, we propose an end-to-end short-duration language identification system based on deep convolutional neural network (DCNN), where the whole network is trained with multi-class cross-entroy loss. Besides, we compare three kinds of input features: Mel-Frequency Cepstral Coefficients (MFCC), log Mel-scale Filter Bank energies (FBANK) and spectrogram energies. The experimental results indicate that spectrogram energies achieves the best performance among them In order to enhance the robustness of system, at the training stage, the databases are augmented by applying time-scale modification (TSM) method. Based on APl 7-OLR databases, under 1-second condition, the proposed system has improved 32.7% than traditional i-vector system, and compared with other neural network systems, it peforms equally well and even better.","PeriodicalId":202966,"journal":{"name":"2019 IEEE 3rd Information Technology, Networking, Electronic and Automation Control Conference (ITNEC)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126322641","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Forecasting stock prices in two ways based on LSTM neural network","authors":"Jingyi Du, Qingli Liu, Kang Chen, Jiacheng Wang","doi":"10.1109/ITNEC.2019.8729026","DOIUrl":"https://doi.org/10.1109/ITNEC.2019.8729026","url":null,"abstract":"Due to the extensive application of deep learning in processing time series and recent progress, LSTM (Long Short-Term Memory) neural network is the most commonly used and most powerful tool for time series models. The LSTM neural network is used to predict Apple stocks by using single feature input variables and multi-feature input variables to verify the prediction effect of the model on stock time series. The experimental results show that the model has a high accuracy of 0.033 for the multivariate input and is accurate, which is in line with the actual demand. For the univariate feature input, the predicted squared absolute error is 0.155, which is inferior to the multi-feature variable input.","PeriodicalId":202966,"journal":{"name":"2019 IEEE 3rd Information Technology, Networking, Electronic and Automation Control Conference (ITNEC)","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114601534","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Xuesong Zheng, Yujie Zheng, Y. Shuai, Jiping Yang, Shuang Yang, Ye Tian
{"title":"Kinematics analysis and trajectory planning of 6-DOF robot","authors":"Xuesong Zheng, Yujie Zheng, Y. Shuai, Jiping Yang, Shuang Yang, Ye Tian","doi":"10.1109/ITNEC.2019.8729280","DOIUrl":"https://doi.org/10.1109/ITNEC.2019.8729280","url":null,"abstract":"With the large-scale development of Intelligent Manufacturing in China, robot technology has been widely applied in the industrial field. Aiming at the motion of six-degree-of-freedom robot, the structure and link parameters of the robot are analyzed, and the forward/reverse kinematics model of the robot is deduced by D-H parameter method. Through the simulation of trajectory planning, the angle, angular velocity and angular acceleration of the 6-DOF robot in the process of motion are analyzed.","PeriodicalId":202966,"journal":{"name":"2019 IEEE 3rd Information Technology, Networking, Electronic and Automation Control Conference (ITNEC)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133860665","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Android software vulnerability mining framework based on dynamic taint analysis technology","authors":"Zhao Min, Yang Haimin, Chen Ping, Yang Zhengxing","doi":"10.1109/ITNEC.2019.8729217","DOIUrl":"https://doi.org/10.1109/ITNEC.2019.8729217","url":null,"abstract":"Security vulnerability mining is at the core of Android system security research. How to effectively exploit Android system security vulnerabilities has become an important technical means to enhance the security of smartphones and protect user security and privacy. An Android software vulnerability mining framework based on dynamic taint analysis technology is designed in this paper. Firstly, it analyzes the shortcomings of existing vulnerability mining technology, then gives the detailed design of the framework, and then discusses in detail the taint propagation analysis under Java context. Complete the switching between Java context and native context taint analysis environment at runtime, instruction preprocessing and other key techniques of Android vulnerability mining based on dynamic taint analysis theory. Finally, summarizes the whole paper and puts forward the problem worthy of further study.","PeriodicalId":202966,"journal":{"name":"2019 IEEE 3rd Information Technology, Networking, Electronic and Automation Control Conference (ITNEC)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130052256","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Lei Hu, Hailong Li, Zhenhua Wei, Siqi Dong, Zhao Zhang
{"title":"Summary of Research on IT Network and Industrial Control Network Security Assessment","authors":"Lei Hu, Hailong Li, Zhenhua Wei, Siqi Dong, Zhao Zhang","doi":"10.1109/ITNEC.2019.8729052","DOIUrl":"https://doi.org/10.1109/ITNEC.2019.8729052","url":null,"abstract":"The difference between traditional IT network and industrial control network determines the different methods of network security assessment. In the face of increasingly serious cybersecurity status, network security assessment research faces new challenges. This paper compares the composition, function and possible damage of IT network and industrial control network, and discusses the existing standards and key technologies related to IT network and industrial control network security assessment. It analyzes the challenges faced by the security assessment of the two networks and looks forward to future research.","PeriodicalId":202966,"journal":{"name":"2019 IEEE 3rd Information Technology, Networking, Electronic and Automation Control Conference (ITNEC)","volume":"124 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128151517","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Hybrid WSN Node Deployment optimization Strategy Based on CS Algorithm","authors":"Tingli Xiang, Hongiun Wang, Yingchun Shi","doi":"10.1109/ITNEC.2019.8729481","DOIUrl":"https://doi.org/10.1109/ITNEC.2019.8729481","url":null,"abstract":"The performance of wireless sensor network (WSN) system is significantly affected by the coverage quality. For the problem of low coverage of static sensor network nodes and high deployment cost of mobile sensor network nodes, a hybrid sensor network based on cuckoo search (CS) is studied. Node deployment optimization strategy. Firstly, the candidate target position of the mobile node is initially determined by the CS algorithm, and then the position optimization scheme is used to reduce the number of mobile nodes and the average moving distance. The experimental results show that the proposed algorithm can effectively optimize the deployment of mobile nodes in hybrid WSN, improve the coverage of target areas, and reduce the energy consumption of nodes.","PeriodicalId":202966,"journal":{"name":"2019 IEEE 3rd Information Technology, Networking, Electronic and Automation Control Conference (ITNEC)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129605597","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on Cross Language Text Keyword Extraction Based on Information Entropy and TextRank","authors":"Xiaoyu Zhang, Yongbin Wang, Lin Wu","doi":"10.1109/ITNEC.2019.8728993","DOIUrl":"https://doi.org/10.1109/ITNEC.2019.8728993","url":null,"abstract":"In order to extract keywords from cross-language documents as accurately as possible, especially for the language whose keyword extraction technology is not mature, a text keyword extraction method based on information entropy and TextRank is proposed to extract the accurate keywords from the translated Chinese documents. This method determines the basic importance of words according to the information entropy of words, and then uses the information entropy of words to vote iteratively through the TextRank algorithm. This method solves the problem that TextRank algorithm easily extracts frequent non key words as keywords. The experimental results show that the proposed method can extract keywords more accurately than TextRank in the processing of cross-lingual bilingual translated documents.","PeriodicalId":202966,"journal":{"name":"2019 IEEE 3rd Information Technology, Networking, Electronic and Automation Control Conference (ITNEC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116303688","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Recognizing Small-Sample Biomedical Named Entity Based on Contextual Domain Relevance","authors":"Shun Zhang, Shaofu Lin, Jiangfan Gao, Jianhui Chen","doi":"10.1109/ITNEC.2019.8729015","DOIUrl":"https://doi.org/10.1109/ITNEC.2019.8729015","url":null,"abstract":"Existing named entity recognition methods are often based on large training samples and cannot effectively recognize fine-grained domain entities with small sample sizes In order to solve this problem, this paper proposes an unsupervised method based on contextual domain relevance for recognizing biomedical named entities with small sample sizes. Based on the distributed semantic model, the statistical and linguistic features of candidate entities in corpora are described by using occurrence frequencies of contexts of candidate entities. Furthermore, the entity-corpus relevance assumption, the log-likelihood ratio and the domain-dependent function are adopted for recognizing objective entities. Experimental results show that, the proposed method can effectively reduce manual interventions and improve the precision rate and recall rate of small-sample biomedical named entity recognition.","PeriodicalId":202966,"journal":{"name":"2019 IEEE 3rd Information Technology, Networking, Electronic and Automation Control Conference (ITNEC)","volume":"107 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116399536","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Macroscopic crowd panic quantification model of crowd evacuation based on information entropy","authors":"R. Zhao, Qianshan Hu, Cuiling Li, Daheng Dong, Qiong Liu, Yunlong Ma, Qin Zhang","doi":"10.1109/ITNEC.2019.8729160","DOIUrl":"https://doi.org/10.1109/ITNEC.2019.8729160","url":null,"abstract":"To solve the existing problem that panic impact on crowd evacuation is less quantitatively considered at the crowd evacuation model, this contribution proposes a panic quantification model based on Aw-Rascle. This model introduces information entropy in information theory to reflect the degree of confusion in crowds, and maps individual velocity distribution into information entropy graph. The information entropy graph reflects the degree of panic for certain time in the entire evacuation space. To validate the panic propagation model, numerical simulation is conducted based on a case study of the Mecca Hajj stampede in 2015. The simulation results show that when the number of people increases, the degree of crowd panic increases, making the evacuation process more chaotic and the information entropy value increasing.","PeriodicalId":202966,"journal":{"name":"2019 IEEE 3rd Information Technology, Networking, Electronic and Automation Control Conference (ITNEC)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134171003","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}