2023 IEEE 6th Information Technology,Networking,Electronic and Automation Control Conference (ITNEC)最新文献

筛选
英文 中文
A Method of Safety Risk Analysis for the lower waterways of the Yangtze River 长江下游航道安全风险分析方法
Shukui Zhang, Si Tao, Zhenguo Ding
{"title":"A Method of Safety Risk Analysis for the lower waterways of the Yangtze River","authors":"Shukui Zhang, Si Tao, Zhenguo Ding","doi":"10.1109/ITNEC56291.2023.10082299","DOIUrl":"https://doi.org/10.1109/ITNEC56291.2023.10082299","url":null,"abstract":"In order to solve the problem of lack of quantitative research in the risk assessment of navigation safety in the lower waterways of the Yangtze River, a factor analysis method based on 5M model (Management, Machine, Man, Media, Mission factor) is proposed, the main influencing factors of 258 major and 223 minor casualty accidents in the lower waterways of the Yangtze River were analyzed by using this method, the results show that poor visibility, large traffic flow, weak safety awareness of crew and outdated ship equipment are the main factors leading to traffic accidents. The effect of factor analysis based on 5M was evaluated by using the coverage rate and influence rate of main factors of accident, and compared with the statistical analysis; the results showed that the coverage rate of factor analysis was slightly lower than that of statistical analysis, but the impact rate increased by 56.4%. The case study shows that the factor analysis method based on 5M is feasible for the navigation safety risk quantitative analysis of the lower waterways of the Yangtze River.","PeriodicalId":218770,"journal":{"name":"2023 IEEE 6th Information Technology,Networking,Electronic and Automation Control Conference (ITNEC)","volume":"431 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132907476","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Study on Rapid Optical Measurement Method and Device of Hemoglobin Concentration 血红蛋白浓度快速光学测量方法及装置的研究
Hangrui Yan, Zhiyong Xiong, Guiyang Yang, Shaokun Li
{"title":"Study on Rapid Optical Measurement Method and Device of Hemoglobin Concentration","authors":"Hangrui Yan, Zhiyong Xiong, Guiyang Yang, Shaokun Li","doi":"10.1109/ITNEC56291.2023.10082378","DOIUrl":"https://doi.org/10.1109/ITNEC56291.2023.10082378","url":null,"abstract":"In order to achieve rapid and accurate measurement of hemoglobin concentration in human whole blood, a rapid optical detection system was developed. The measurement principle, optical path design, mechanical structure design and microcuvette design are studied. Firstly, the rapid measurement of hemoglobin concentration was studied by using the scattering and spectral absorption characteristics of erythrocytes. Secondly, the optical path design and structure design of the optical measurement system are analyzed and studied. Then, a microcuvette for optical detection is designed, and its structure is designed according to fluid mechanics, and its precision is analyzed according to measurement error. Finally, the calibration curve and precision analysis of the measurement system, as well as the correlation analysis with the standard High iron cyanide process method are given. The experimental results show that the system can give the hemoglobin concentration results within 3 seconds, the CV value is less than 2%, the correlation coefficient is greater than 0.99, and the correlation with the international standard cyanidation high-speed iron method can reach more than 0.99.The detection device has the characteristics of high speed, high precision, no pollution in the detection process, and high efficiency and environmental protection.","PeriodicalId":218770,"journal":{"name":"2023 IEEE 6th Information Technology,Networking,Electronic and Automation Control Conference (ITNEC)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132206081","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research and Application of Music Personalized Recommendation System Based on Random Forest Algorithm 基于随机森林算法的音乐个性化推荐系统研究与应用
Ziyan Shu, Qing Shen, Tianlun Zeng
{"title":"Research and Application of Music Personalized Recommendation System Based on Random Forest Algorithm","authors":"Ziyan Shu, Qing Shen, Tianlun Zeng","doi":"10.1109/ITNEC56291.2023.10082503","DOIUrl":"https://doi.org/10.1109/ITNEC56291.2023.10082503","url":null,"abstract":"In recent years, with the advent of the era of big data and the rise of data mining technology, people used to waste a lot of time looking for advantageous information, which was very inefficient. Music is an indispensable part of everyone’s daily life, and major music platforms are gradually emerging. Finding music that users like is the key to attracting users. At present, there are relatively few studies on personalized music recommendation using data mining algorithms. In this paper, the random forest algorithm is used to pre-process the collected data, and then the data is modeled, the model parameters and fitting coefficients are adjusted, the appropriate index is selected as the learning parameter, and the learning curve is obtained at the same time. Finally, the prediction is carried out through examples, and it is found that the prediction accuracy is high, and the WeChat applet is used for development and application. The approach in this article is simple and constructive, and it is dedicated to recommending personalized and exclusive music for particular users, so that you can spend every day happily.","PeriodicalId":218770,"journal":{"name":"2023 IEEE 6th Information Technology,Networking,Electronic and Automation Control Conference (ITNEC)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134110852","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on Intelligence Mining of Illegal Underground Internet Production on Anonymous Network : Taking Personal Information Trading as an Example 匿名网络下非法地下互联网生产的智能挖掘研究——以个人信息交易为例
Guangxuan Chen, Guangxiao Chen, Di Wu, Qiang Liu, Lei Zhang
{"title":"Research on Intelligence Mining of Illegal Underground Internet Production on Anonymous Network : Taking Personal Information Trading as an Example","authors":"Guangxuan Chen, Guangxiao Chen, Di Wu, Qiang Liu, Lei Zhang","doi":"10.1109/ITNEC56291.2023.10081964","DOIUrl":"https://doi.org/10.1109/ITNEC56291.2023.10081964","url":null,"abstract":"As law enforcement agencies continue to strengthen their efforts to crack down on illegal underground Internet production trading activities, criminals gradually transfer illegal personal information trading and other illegal products, as well as other related crimes, to anonymous networks. Taking Tor dark network as the target, this paper designs active node detection methods and passive node detection methods to obtain criminal intelligence on the dark network. Through the design of the dark web crawler, a large number of personal information transaction related data were obtained. At the same time, the data were analyzed in time, space, type and theme dimensions, forming effective and targeted information. The intelligence mining method proposed in this paper can effectively collect the data related to the subject, form the multi-dimensional analysis results that can be displayed according to the needs, and provide certain technical support for the law enforcement agencies to fight against the hidden network crime.","PeriodicalId":218770,"journal":{"name":"2023 IEEE 6th Information Technology,Networking,Electronic and Automation Control Conference (ITNEC)","volume":"161 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134118766","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Prediction and Analysis of Customer Churn of Automobile Dealers Based on BI 基于BI的汽车经销商客户流失预测与分析
Deqing Zhang, Cuoling Zhang, Chun Zheng
{"title":"Prediction and Analysis of Customer Churn of Automobile Dealers Based on BI","authors":"Deqing Zhang, Cuoling Zhang, Chun Zheng","doi":"10.1109/ITNEC56291.2023.10082554","DOIUrl":"https://doi.org/10.1109/ITNEC56291.2023.10082554","url":null,"abstract":"Customer resource is an important lifeline for the survival and development of enterprises. In the context of the rapid expansion of China’s automobile sales market, with the deepening and refinement of enterprise marketing concepts, it is crucial for automobile enterprises to fully use customer consumption behavior data to mine valuable information and customize retention measures for potential lost customers. This paper takes the open dataset of auto dealer customer churn as the research object, and analyzes and models it from the perspective of business intelligence. First, data analysis (DA) and visualization methods are used to analyze and process the dataset; Then, for the problem of sample imbalance, authors use 6 sampling techniques to balance, such as SMOTE oversampling and SMOTEENN, SMOTETomek comprehensive sampling techniques to deal with it, and uses machine learning models, such as Decision Tree, Logical Regression, XGBoost, AdaBoost and other algorithms for modeling and analysis. The authors compare the models according to Recall and AUC values, and concludes that XGBoost is the optimal prediction model. The results show that the Recall and AUC of the model prediction results based on this dataset reach 0.926 and 0.842 respectively, which can help automobile enterprises effectively identify the lost customers. On the other hand, this study can also help auto enterprises customize retention measures for potential lost customers.","PeriodicalId":218770,"journal":{"name":"2023 IEEE 6th Information Technology,Networking,Electronic and Automation Control Conference (ITNEC)","volume":"4 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134505688","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design and Implementation of the Ship Alarm Management System for Chief Engineer 轮机长船舶报警管理系统的设计与实现
Guobing Li, Hongling Zhao, Mengyin Ma, Yang Zhao, Peiwen Zhang
{"title":"Design and Implementation of the Ship Alarm Management System for Chief Engineer","authors":"Guobing Li, Hongling Zhao, Mengyin Ma, Yang Zhao, Peiwen Zhang","doi":"10.1109/ITNEC56291.2023.10082225","DOIUrl":"https://doi.org/10.1109/ITNEC56291.2023.10082225","url":null,"abstract":"Recently, the number of ship acquisition and control signals is increasing, more and more information exchange and sharing. As a result, the number of ship alarms increased rapidly. The standard of ANSI/ISA[1] 18.2 proposed that the optimal number of alarms for human management is 6 on average per hour, and no more than 12 at most. In real time, the number of alarms pushed up to the Chief Engineer of the ship far exceeds this number. This has brought serious troubles to the Chief Engineer. Based on the analysis of the ship alarm flooding factors and the Chief Engineer's focus attention, it designs and implements a ship alarm management system for the Chief Engineer. The experiment proves that the alarm management system can eliminate repeated alarms effectively, prevent the alarm flooding, extract the alarms concerned by the Chief Engineer, and provide more matching information assistance for the Chief Engineer to respond quickly.","PeriodicalId":218770,"journal":{"name":"2023 IEEE 6th Information Technology,Networking,Electronic and Automation Control Conference (ITNEC)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131686833","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A community discovery algorithm based on local extension of high-order triangle 基于高阶三角形局部扩展的社区发现算法
Pengju Guo, Chen Mei, Youshu Wang, Hongyu Zhu
{"title":"A community discovery algorithm based on local extension of high-order triangle","authors":"Pengju Guo, Chen Mei, Youshu Wang, Hongyu Zhu","doi":"10.1109/ITNEC56291.2023.10082578","DOIUrl":"https://doi.org/10.1109/ITNEC56291.2023.10082578","url":null,"abstract":"Community structure is an important feature of complex networks. Compared with global community discovery methods, local community discovery methods can discover communities efficiently without complete information about the network structure. Most locally extended algorithms rely on core nodes to discover communities, where the core nodes are based on local density without considering the topological distribution among nodes, and it is difficult to determine the communities to which nodes that are far away and nodes that are in between communities have low similarity to different cores. Therefore, a community discovery algorithm based on local extension of higher-order triangles is proposed at LEHT. The algorithm firstly identifies all three closely linked nodes based on the local topological distribution of nodes in the network using the higher-order triangle structure, and then calculates the most core higher-order triangle of each node using the link strength to form the initial community. Secondly only the core higher-order triangles need to be merged in the topological dimension, and the problem of low similarity of nodes further away from the core is eliminated by extending the direct neighbourhood information between the core higher-order triangles. Finally independent nodes that are not within the core triangles are joined to the community where it is close to a neighbouring node with large centrality. The LEHT algorithm is analysed in comparison with five representative classical algorithms on real and synthetic networks, and the experimental results show that the effectiveness of the LEHT algorithm performs better.","PeriodicalId":218770,"journal":{"name":"2023 IEEE 6th Information Technology,Networking,Electronic and Automation Control Conference (ITNEC)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125596277","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Grey Predictive Control of the Generator Governor System 发电机调速器系统的灰色预测控制
Tianjing Ji, M. Wang, Fawei Wang, Minqiu Zhou
{"title":"Grey Predictive Control of the Generator Governor System","authors":"Tianjing Ji, M. Wang, Fawei Wang, Minqiu Zhou","doi":"10.1109/ITNEC56291.2023.10082251","DOIUrl":"https://doi.org/10.1109/ITNEC56291.2023.10082251","url":null,"abstract":"To solve the stability problems of power system under a big or small disturbances, this paper proposes a generator governoring system based on the theory of grey prediction control method. Grey predictive control can predict the future behavior data of the system and make advance control according to the known behavior of the system. In this paper, the conventional PID control is introduced into the decision-making link of the classical grey GM (1,1) model, then the Grey Predictive PID controller is designed. Taking the actual speed as the sample, the future data change of the system is predicted, and finally the advanced control signal is output to realize the advanced control of \"prevention in the first place\". The control effect is simulated with MATLAB. The results show that the Grey Predictive PID control can effectively reduce the overshoot and adjustment time, and make the system quickly enter the stable state. Compared with the conventional control, its control effect is more remarkable.","PeriodicalId":218770,"journal":{"name":"2023 IEEE 6th Information Technology,Networking,Electronic and Automation Control Conference (ITNEC)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124014977","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Dynamic Task Allocation for Heterogeneous Multi-Robot System under Communication Constraints 通信约束下异构多机器人系统的动态任务分配
Jun Yu Li, Zhongxuan Cai, Minglong Li, Wanrong Huang, Yongjun Zhang
{"title":"Dynamic Task Allocation for Heterogeneous Multi-Robot System under Communication Constraints","authors":"Jun Yu Li, Zhongxuan Cai, Minglong Li, Wanrong Huang, Yongjun Zhang","doi":"10.1109/ITNEC56291.2023.10082491","DOIUrl":"https://doi.org/10.1109/ITNEC56291.2023.10082491","url":null,"abstract":"Multi-robot system has important application potential in disaster rescue and other dangerous scenarios, in which task allocation is the basis for multi-robot cooperation to complete tasks. Due to the limited ability of individual robots, many complex scenarios requires coordination of different types of robot, e.g. robots for search, communication, rescue and so on. At the same time, communication is often limited in a wide range of scenarios. This brings two challenges in the realistic environment: heterogeneous multi-robot cooperation problem and communication constraint problem. This paper proposes a task allocation method based on hierarchical auction and dynamic grouping. By introducing a dynamic grouping algorithm to the general allocation procedure, we simultaneously optimize the number of robots in each group and the communication distance between robots. Then the communication loss rate can be reduced to improve task execution efficiency. Simulations of a communication constrained search and rescue scenario are conducted to verify the proposed algorithm, which are compared with the vanilla auction algorithm and a hierarchical approach on static grouping. The results show that our method surpasses the baseline on both task achievement and communication performance.","PeriodicalId":218770,"journal":{"name":"2023 IEEE 6th Information Technology,Networking,Electronic and Automation Control Conference (ITNEC)","volume":"109 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124056148","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Configurable On-Chip Spike Encoding Network Based on Dual-Mode Integrate & Fire Neurons 基于双模集成与火神经元的可配置片上尖峰编码网络
Zhengqing Zhong, Yunpeng Tuo, Haibing Wang, Tengxiao Wang, Junxian He, Sihao Chen, Min Tian, Cong Shi
{"title":"A Configurable On-Chip Spike Encoding Network Based on Dual-Mode Integrate & Fire Neurons","authors":"Zhengqing Zhong, Yunpeng Tuo, Haibing Wang, Tengxiao Wang, Junxian He, Sihao Chen, Min Tian, Cong Shi","doi":"10.1109/ITNEC56291.2023.10081991","DOIUrl":"https://doi.org/10.1109/ITNEC56291.2023.10081991","url":null,"abstract":"For edge intelligence applications, this work proposes a tiny spike encoding network embedded with high-speed on-chip encoding capability, which applies the proposed dual-mode Integrate & Fire (IF) neuron model to support different coding schemes. The proposed encoding network was prototyped on a Zynq-7020 FPGA device, with an on-chip encoding speed as high as 2127 frame/s, while dissipating only 69 mW under a 250 MHz clock frequency. Our spiking neural network hardware encoder adopts an eight-core architecture for parallel computing to improve processing speed, supporting three well-known coding schemes, i.e. rate coding, burst coding and time-to-firstspike (TTFS) coding. To verify the performance of different coding schemes realized by our hardware encoder, the widely used MNIST and Fashion-MNIST datasets were selected as benchmark. After encoding, all spiking addressevent representation (AER) data were sent to a two-layer fully connected network with BP-STDP learning rule for training and inference, which was completed on PC software. Finally, three coding schemes (rate coding, burst coding and time-to-first-spike coding) all achieved comparably high classification accuracies on MNIST and Fashion-MNIST datasets (95.87%, 92.23% and 88.22% on MNIST, 83.79%, 82.71% and 73.79% on Fashion-MNIST, respectively).","PeriodicalId":218770,"journal":{"name":"2023 IEEE 6th Information Technology,Networking,Electronic and Automation Control Conference (ITNEC)","volume":"107 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127880731","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信