{"title":"Design and simulation of variable diameter pipe cleaning robots","authors":"Y. Liang, Ying Zhu, Wenbin Pan, Kairui Mai","doi":"10.1117/12.2685625","DOIUrl":"https://doi.org/10.1117/12.2685625","url":null,"abstract":"In view of the weak obstacle crossing ability and poor versatility of pipeline robots on the market, this paper designs an adaptive variable diameter pipeline inspection robot with obstacle crossing ability, which senses pressure changes through the pressure gyroscope and feeds back to the control center for feedback adjustment, and then the actuator variable diameter motor performs the diameter change, with the parallelogram reducer mechanism to enable the robot to stably change the diameter and walk, and the walking wheel mechanism is also equipped with a telescopic mechanism. Based on the principle of virtual work, the theoretical mechanical force analysis and ADAMS simulation of the mechanism were carried out to verify its rationality.","PeriodicalId":305812,"journal":{"name":"International Conference on Electronic Information Technology","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-08-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115579092","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Environmental risk perception and warning strategy of power metering laboratory based on LSTM network","authors":"Xingyuan Wang, Chuyan Wang, Yi-ping Sun, zuming cheng","doi":"10.1117/12.2685979","DOIUrl":"https://doi.org/10.1117/12.2685979","url":null,"abstract":"This study proposes an environmental risk perception and early warning method for metrology laboratories that combines information acquisition, feature extraction, deep learning, and bias analysis. First, various sensors are used to collect operating data from the laboratory and extract its operating characteristics. The data is then processed using long and short-term memory neural network (LSTM) to predict the laboratory's operational state. Finally, the generalized extreme value theory is employed to establish the alarm threshold based on the normal running state, enabling early risk warning of the equipment. The experimental results demonstrate that the LSTM model is highly effective, achieving stable risk prediction accuracy above 98%, surpassing other neural network models.","PeriodicalId":305812,"journal":{"name":"International Conference on Electronic Information Technology","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-08-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114256711","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yi Du, Jiangyuan Gu, Ming Zhong, Boxiao Han, Hongjun He, Yang Hu, Leibo Liu, Shaojun Wei, S. Yin
{"title":"An utilization-efficient context memory design for reconfigurable processing array with locally shared strategy","authors":"Yi Du, Jiangyuan Gu, Ming Zhong, Boxiao Han, Hongjun He, Yang Hu, Leibo Liu, Shaojun Wei, S. Yin","doi":"10.1117/12.2685647","DOIUrl":"https://doi.org/10.1117/12.2685647","url":null,"abstract":"In recent years, reconfigurable architectures have gained popularity as they have advantages on the design of energyefficient accelerators. Facing many application scenarios, existing reconfigurable processing arrays need access context information from distributed or centralized context memory which was exposed to low storage efficient. In this paper, we propose a locally shared context memory architecture of a reconfigurable processing array to improve storage efficiency and greatly reduce the context data movement. This design can reduce the area of the reconfigurable array by 12.4%, and the power consumption of the reconfigurable array by 40%.","PeriodicalId":305812,"journal":{"name":"International Conference on Electronic Information Technology","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-08-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127828352","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research of SFP56 long range industrial-temperature optical transceiver based on digital signal processing","authors":"Meng Han, Zhu Xiao","doi":"10.1117/12.2685789","DOIUrl":"https://doi.org/10.1117/12.2685789","url":null,"abstract":"This paper mainly studies SFP56 optical transceiver, whose signal transmission rate is 50Gbps, transmission distance is 10km, working wavelength is 1310nm, working temperature is -40℃ to 85℃, and the small form-factor pluggables package structure is adopted. The SFP56 LR I-temp optical transceiver is mainly applied to 5G pretransmission networks to realize high-speed conversion between optical signal and electrical signal during optical signal transmission. The design adopts DSP technology, PAM4 encoding and TOSA scheme with built-in laser driver chip. The built-in laser driver chip is used to provide bias current and modulation current for the laser, thus realizing the stable transmission and reception of optical signals up to 53.125Gbps in 10km fiber. Compared with the traditional CDR technology and TOSA external laser driver chip scheme, DSP technology is based on digital signal processing. In addition to realizing clock and data recovery, DSP technology adds finite impulse response processing and multi-stage filtering in functions. Moreover, the scheme of TOSA built-in driver chip reduces the influence of impedance discontinuity and impedance mismatch of high-speed line between optical chip and electrical chip, so that the indicators of the optical module transmitter are better, the bit error rate of the receiving end is more stable, the power consumption is lower, and the reliability is better.","PeriodicalId":305812,"journal":{"name":"International Conference on Electronic Information Technology","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-08-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125531479","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Data access security monitoring system based on zero trust mechanism","authors":"Jianli Han","doi":"10.1117/12.2685667","DOIUrl":"https://doi.org/10.1117/12.2685667","url":null,"abstract":"At present, the public data platform lacks high-security certification for its behavior and access, and cannot effectively respond to internal and external threats, which can easily lead to security issues such as network security and data leakage. To this end, this paper designs a data access security monitoring system based on zero trust mechanism. The zero trust system is designed to consist of five components: Trusted Access Console (TAC), Trusted Application Agent (TAP), Trusted API Agent (TIP), Intelligent Identity Analysis System (IDA) and Trusted Environment Awareness System (TESS) . Through quantitative analysis, the security risk perception value of the public data platform is obtained, so as to achieve the purpose of security risk perception of the public data platform. It is proved by experiments that the system has high recognition accuracy and can effectively improve the average access bandwidth of the network.","PeriodicalId":305812,"journal":{"name":"International Conference on Electronic Information Technology","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-08-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129778079","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Qiang-Feng Zhang, Jie Ying Gao, Yuzhong Niu, Ming Li, Zhanquan Yin, S. Wei, Huan Chen, Zhijun Li, Xing Gao, Wenchun Chang
{"title":"Application of satellite remote sensing in the treatment of power transmission line unplanned construction operation","authors":"Qiang-Feng Zhang, Jie Ying Gao, Yuzhong Niu, Ming Li, Zhanquan Yin, S. Wei, Huan Chen, Zhijun Li, Xing Gao, Wenchun Chang","doi":"10.1117/12.2685857","DOIUrl":"https://doi.org/10.1117/12.2685857","url":null,"abstract":"Unplanned construction operation on the site of power transmission and transformation project occurs frequently. In order to catch up with or speed up the construction progress, the construction site does not report the plan and arranges the operation without permission. This kind of unplanned operation lacks monitoring and is untracked, which inevitably leads to inadequate safety measures, leading to greater construction safety risks. Satellite remote sensing technology has developed rapidly. It has significant advantages such as wide coverage, a stable renewal cycle, less limited by environmental conditions, and a large amount of information. At the same time, it is completely independent of the construction group. It can provide objective and full coverage visualization of the transmission line construction project. It is an effective technical means to carry out unplanned operation investigations and random inspections.","PeriodicalId":305812,"journal":{"name":"International Conference on Electronic Information Technology","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-08-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132925407","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Incorporating chunking information for Chinese named entity recognition using neural networks","authors":"Chen Lyu, Junchi Zhang, Jiangping Huang","doi":"10.1117/12.2685645","DOIUrl":"https://doi.org/10.1117/12.2685645","url":null,"abstract":"Most named entity recognition (NER) systems use supervised machine learning methods, including linear models and neural networks. However, both methods require large amounts of annotated data. In this paper, we utilize chunking resources to improve the performance of NER without annotating more data and investigate two approaches to incorporate chunking information in the character-level neural network framework for Chinese NER. The first approach is multi-task learning, which falls into the framework of sharing common feature representation of Chinese chunking and NER task. The second approach is based on stacking, which uses the features provided by a trained chunking model to guide the NER model. Experimental results on OntoNotes 4.0 corpus show that compared with the models only using the NER corpus, the NER models which utilize the chunking resources can improve the performance of NER.","PeriodicalId":305812,"journal":{"name":"International Conference on Electronic Information Technology","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-08-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133324838","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"ECC-CS: a multi-label data classification algorithm for class imbalance based on cost-sensitive learning","authors":"Jicong Duan, Hualong Yu","doi":"10.1117/12.2685783","DOIUrl":"https://doi.org/10.1117/12.2685783","url":null,"abstract":"Multi-label learning has attracted much attention due to its numerous applications in the real world. Although many multilabel learning algorithms have been proposed, most of them neglect the class imbalance problem that exists in multi-label data. Even when some studies focus on this problem, they often fail to explore label correlations. To address these two issues simultaneously, a cost-sensitive-based class imbalance multi-label data classification method called ECC-CS (Ensemble classifier chains - Cost sensitive) is proposed. In brief, ECC-CS combines the popular Ensemble Classifier Chain (ECC) algorithm with cost-sensitive learning techniques. Therefore, the ECC-CS algorithm simultaneously inherits the merit of label correlation exploration held by ECC and the merit of addressing the class imbalance problem owned by cost-sensitive learning techniques. Specifically, in ECC-CS, the cost-sensitive learning technique runs on each branch of ECC. 12 benchmark multi-label datasets were used to compare the proposed ECC-CS algorithm with several traditional class imbalance multi-label learning algorithms. The experimental results have indicated the effectiveness and superiority of the proposed ECC-CS algorithm.","PeriodicalId":305812,"journal":{"name":"International Conference on Electronic Information Technology","volume":"164 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-08-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132166708","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Power allocation algorithm based on channel capacity in cooperative communication","authors":"Hongyang Lv, Guifen Chen, Guangjiao Chen","doi":"10.1117/12.2685741","DOIUrl":"https://doi.org/10.1117/12.2685741","url":null,"abstract":"In order to solve the problems of low robustness and high complexity of power allocation algorithm in cooperative communication, under the constraints of limited channel strength, number of nodes and total power, this paper presents a power allocation algorithm based on channel capacity in cooperative communication. Based on the traditional channel capacity model, the harmonic mean and average weight of channel strength are introduced to simplify the solution process of the objective function in order to reduce the complexity of the algorithm. The crossover and mutation rules in the genetic algorithm are introduced to avoid local optima, and intelligent velocity constraints of particles are established to reduce the algorithm complexity. The optimal function is established by calculating the channel strength weight coefficients. Simulation results show that the proposed algorithm has improved in channel capacity and convergence compared to the mainstream and original algorithms. The improved algorithm has better practicality and advancement in cooperative communication.","PeriodicalId":305812,"journal":{"name":"International Conference on Electronic Information Technology","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-08-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132262034","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Wireless microseismic monitoring technology based on cloud service platform","authors":"Hu Ji, Ruiping Dai","doi":"10.1117/12.2685714","DOIUrl":"https://doi.org/10.1117/12.2685714","url":null,"abstract":"With the deepening of the depth of open-pit mining, the country's open-pit mining gradually into the deep depression mining stage, the number of high and steep rock slopes increased, landslide accidents frequently occur. Landslide accident has become a major hidden danger in open-pit mine safety production. Microseismic monitoring technology has been widely recognized by the industry as an effective slope monitoring and early warning means covering the whole mine. In this paper, a wireless microseismic monitoring scheme is formed through wireless bridge technology and solar power supply technology, which is successfully implemented in an open-pit mine slope monitoring. The data processing and analysis results are uploaded to the cloud service platform in real time. The wireless microseismic monitoring system based on cloud service platform runs stably, successfully solving the problem of long-term stable operation of the open-pit slope monitoring system and ensuring the safety of mine production.","PeriodicalId":305812,"journal":{"name":"International Conference on Electronic Information Technology","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-08-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132262469","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}