2021 International Conference on Electronics, Circuits and Information Engineering (ECIE)最新文献

筛选
英文 中文
A Deep Learning-based Super-resolution Model for Bistatic SAR Image 基于深度学习的双基地SAR图像超分辨率模型
Xi Cen, Xuan Song, Ya-chao Li, Chunfeng Wu
{"title":"A Deep Learning-based Super-resolution Model for Bistatic SAR Image","authors":"Xi Cen, Xuan Song, Ya-chao Li, Chunfeng Wu","doi":"10.1109/ECIE52353.2021.00056","DOIUrl":"https://doi.org/10.1109/ECIE52353.2021.00056","url":null,"abstract":"Target detection and recognition of bistatic SAR image has been widely studied in recently. However, how to accurately detect and recognize targets with low-resolution and small size in the image is still a problem. Image super-resolution reconstruction technology can increase image resolution and expand target size to improve detection and recognition performance. Thus, we in this paper bring deep learning onto the topic of bistatic SAR image super-resolution reconstruction and propose a novel super-resolution reconstruction model (named FSRCNN) for bistatic SAR images. The proposed model is characterized by a feature extractor with different structures, a feedback feature enhancement block, and a feature fusion module. During the experiments of bistatic SAR measured data, our method is proved to perform clearer visual effects than other image super-resolution reconstruction method. Moreover, our model achieves the best value on peak signal to noise ratio and structural similarity, which indicates that our model can effectively super-resolution reconstruct bistatic SAR images.","PeriodicalId":219763,"journal":{"name":"2021 International Conference on Electronics, Circuits and Information Engineering (ECIE)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115000753","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Design of fully differential balanced photoelectric detection circuit for time domain interference system 时域干扰系统全差分平衡光电检测电路的设计
Xue Kejuan, Wang Jinsong, Wang Ruizhi, Liu Ying
{"title":"Design of fully differential balanced photoelectric detection circuit for time domain interference system","authors":"Xue Kejuan, Wang Jinsong, Wang Ruizhi, Liu Ying","doi":"10.1109/ECIE52353.2021.00014","DOIUrl":"https://doi.org/10.1109/ECIE52353.2021.00014","url":null,"abstract":"Aiming at the problems of DC component and noise interference in the transimpedance photoelectric amplification detection circuit of the time domain interference system, the composition of the low-coherence time domain signal and the equivalent noise model of the transimpedance photoelectric amplification circuit are analyzed, and balanced detectors and fully differential photoelectricity are used. The detection circuit is combined to select and calculate the circuit device, complete the design of the fully differential balanced photoelectric detection circuit, and apply it to the signal processing of the time domain interference system of the biometer. Experimental results show that the designed circuit can effectively suppress the influence of DC component and noise, and significantly improve the quality of the system signal.","PeriodicalId":219763,"journal":{"name":"2021 International Conference on Electronics, Circuits and Information Engineering (ECIE)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121806208","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Application of face verification based on Angular Margin triplet in train diagram management system 基于角余量三元组的人脸验证在运行图管理系统中的应用
Ning Wang, Qihong Yue, Tao Meng, Xiaoyong Chen, Dunlei Yuan, Xiangqian Liu
{"title":"Application of face verification based on Angular Margin triplet in train diagram management system","authors":"Ning Wang, Qihong Yue, Tao Meng, Xiaoyong Chen, Dunlei Yuan, Xiangqian Liu","doi":"10.1109/ECIE52353.2021.00067","DOIUrl":"https://doi.org/10.1109/ECIE52353.2021.00067","url":null,"abstract":"The data managed by the train diagram management system is related to the safe operation of the train, so how to ensure that the management system is not modified, added or deleted by unauthorized personnel is very important for the safe operation of the train. In order to ensure that only legitimate users can access the train diagram data, a face verification algorithm based on Angular Margin triplett is proposed, and is applied to the login verification and modification data verification modules of train diagram management system to realize the safety management of train diagram data.","PeriodicalId":219763,"journal":{"name":"2021 International Conference on Electronics, Circuits and Information Engineering (ECIE)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114549324","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cross-modal Pedestrian Re-identification Based on Generative Confrontation Network 基于生成对抗网络的跨模式行人再识别
Jun Hu, Xiaoling Li
{"title":"Cross-modal Pedestrian Re-identification Based on Generative Confrontation Network","authors":"Jun Hu, Xiaoling Li","doi":"10.1109/ECIE52353.2021.00082","DOIUrl":"https://doi.org/10.1109/ECIE52353.2021.00082","url":null,"abstract":"Pedestrian re-recognition is a very important research direction in video surveillance. With the emphasis on night video surveillance, pedestrian re-recognition is also being studied from a single mode to a cross-mode direction. Since the images taken by the camera at night are generally divided into two types, thermal imaging and infrared images, corresponding to the RegDB data set and the SYSU-MM01 data set respectively. In order to make the trained model have good performance in both data sets, GAN network is used in this article. The visible light image is generated by CycleGAN to generate the corresponding infrared image, and then the infrared image is generated by PTGAN to generate a thermal imaging style image. Then input the image into the single-stream network for training and learning, and finally optimize the network in an end-to-end manner.","PeriodicalId":219763,"journal":{"name":"2021 International Conference on Electronics, Circuits and Information Engineering (ECIE)","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115945038","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Research on Tennis Recognition Technology Based on Computer Vision 基于计算机视觉的网球识别技术研究
Zhang Lu
{"title":"Research on Tennis Recognition Technology Based on Computer Vision","authors":"Zhang Lu","doi":"10.1109/ECIE52353.2021.00072","DOIUrl":"https://doi.org/10.1109/ECIE52353.2021.00072","url":null,"abstract":"Visual attention mechanism is one of the important means for human beings to perceive the external world. Using mathematical models to introduce visual attention mechanism into computer vision to simulate human visual perception system is a hot research topic in the field of computer vision. The research of visual attention model is not only helpful for human beings to better explore the working mechanism of human visual attention, but also has very important significance for solving large-scale data screening and improving image processing efficiency, which has important application value in moving object detection, machine vision, image information matching, image compression and other fields. The visual attention model is used to preprocess the video sequence, and the region of interest is found as the candidate region for target detection. Then the color and shape matching algorithm is used to match the candidate regions. Experiments on tennis video show that the algorithm can recognize the target well when the color and shape of the target are relatively single and the significance in the background is high.","PeriodicalId":219763,"journal":{"name":"2021 International Conference on Electronics, Circuits and Information Engineering (ECIE)","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131358352","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analysis of On-site Evaluation Methods of Network Security in the Evaluation of Information Security Level Protection 信息安全等级保护评估中网络安全现场评估方法分析
Dabin Sun, Bowei Wang
{"title":"Analysis of On-site Evaluation Methods of Network Security in the Evaluation of Information Security Level Protection","authors":"Dabin Sun, Bowei Wang","doi":"10.1109/ECIE52353.2021.00062","DOIUrl":"https://doi.org/10.1109/ECIE52353.2021.00062","url":null,"abstract":"Network security on-site evaluation is not only an important content of the information security level protection evaluation project, but also a major difficulty. It should accurately select network evaluation objects and evaluation methods for different user access paths. In view of the incomplete technical information in the current network field security evaluation, the limited ability and non-cooperation of the technical personnel of the evaluated party, this article provides some suggestions on how to achieve efficient, fast and accurate evaluation.","PeriodicalId":219763,"journal":{"name":"2021 International Conference on Electronics, Circuits and Information Engineering (ECIE)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134237308","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Application of Learning-based Multi-view Stereo in Digital Design 基于学习的多视点立体在数字设计中的应用
Ke Zhang, Mengyu Liu
{"title":"Application of Learning-based Multi-view Stereo in Digital Design","authors":"Ke Zhang, Mengyu Liu","doi":"10.1109/ECIE52353.2021.00075","DOIUrl":"https://doi.org/10.1109/ECIE52353.2021.00075","url":null,"abstract":"Image-based 3D reconstruction technology has been widely used in automatic driving, medical image reconstruction, positioning and navigation. At present, the digital design is still dominated by drawing 3D models manually, which has some shortcomings such as time-consuming and limited accuracy. To solve the above problems and improve the efficiency of digital design, a learning-based multi-view stereo 3D reconstruction technique is introduced for dense reconstruction, and then a grid model is generated for parametric design. We experimented our method and the results show that it can greatly improve the efficiency of 3D digital design, obtain high precision, and retain the texture information of the object.","PeriodicalId":219763,"journal":{"name":"2021 International Conference on Electronics, Circuits and Information Engineering (ECIE)","volume":"89 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124148679","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Fall recognition algorithm for the elderly based on home service robot 基于家庭服务机器人的老年人跌倒识别算法
Xiao Li, Wanmi Chen
{"title":"Fall recognition algorithm for the elderly based on home service robot","authors":"Xiao Li, Wanmi Chen","doi":"10.1109/ECIE52353.2021.00074","DOIUrl":"https://doi.org/10.1109/ECIE52353.2021.00074","url":null,"abstract":"The elderly living alone may not be able to stand up when they fall, nor can they timely call the police or inform others, so they may face the risk or even life-threatening. Researchers have developed a lot of schemes based on the fall process, but some of these schemes are too difficult to promote because they are inconvenient to wear and some are too limited because of the location of the camera. This paper proposes an accidental fall reorganization method based on the symmetry principle of home service robot. The Kinect can obtain the monitoring video, frame information of the human body is extracted through OpenPose, and four key parameters are used to identify the fall: speed of descent at the center of the articulatio coxae, the human body centerline angle with the ground, and the aspect ratio of rectangle outside human body, and whether the old man has stood. Finally, the home service robot can confirm whether the alarm is needed with the elderly through voice interaction. This method has 97.3% success rate to recognize the fall down behavior.","PeriodicalId":219763,"journal":{"name":"2021 International Conference on Electronics, Circuits and Information Engineering (ECIE)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124379999","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Location and Ranging Process of TOA Algorithm Based on CSS Technology 基于CSS技术的TOA算法定位与测距过程
Yijie Li
{"title":"Location and Ranging Process of TOA Algorithm Based on CSS Technology","authors":"Yijie Li","doi":"10.1109/ECIE52353.2021.00064","DOIUrl":"https://doi.org/10.1109/ECIE52353.2021.00064","url":null,"abstract":"In the application system of Internet of things, it is widely used in wireless network node location information and positioning. According to the principle and strategy of wireless network node positioning, this paper classifies various wireless network node positioning methods, and expounds and explains the principles of various common positioning systems and technologies under the topology environment of wireless network and wireless local area network. Node location in wireless network is a process in which nodes determine the location information of other nodes in the network according to the location information of a few known nodes in the network through location technology algorithm and strategy. This paper analyzes the characteristics and performance of positioning technology based on signal strength in wireless network, and explains the application of positioning algorithm in wireless network.","PeriodicalId":219763,"journal":{"name":"2021 International Conference on Electronics, Circuits and Information Engineering (ECIE)","volume":"135 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114487299","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A New Flexible Radio Frequency Microstrip Used in Cryostat 一种用于低温恒温器的新型柔性射频微带
Fanqi Xu, Heng Lu, Chen Yang, Ye Tian, Fengnan Chen, Ying Yan, J. Moser
{"title":"A New Flexible Radio Frequency Microstrip Used in Cryostat","authors":"Fanqi Xu, Heng Lu, Chen Yang, Ye Tian, Fengnan Chen, Ying Yan, J. Moser","doi":"10.1109/ECIE52353.2021.00016","DOIUrl":"https://doi.org/10.1109/ECIE52353.2021.00016","url":null,"abstract":"A flexible radio frequency (RF) microstrip attached to a nanopositioner in a cryostat is presented. It makes it possible to supply RF signals to a device mounted on the nanopositioner without hindering the motion of the positioner. The insertion loss of the microstrip is 1 dB at 3 GHz. The nanopositioner can move freely at 900mK with the microstrip attached to it This kind of flexible RF microstrip is useful for measuring nanomechanical resonators in the cryostat.","PeriodicalId":219763,"journal":{"name":"2021 International Conference on Electronics, Circuits and Information Engineering (ECIE)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123214275","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信