{"title":"Advanced process library irradiation parameter modeling and analysis techniques","authors":"Fayin Shi, Liang Wang, Qian Sang, Mengdong Shen, Yong Li, Chang Liu","doi":"10.1117/12.2685474","DOIUrl":"https://doi.org/10.1117/12.2685474","url":null,"abstract":"The irradiation experimental analysis of chips can obtain irradiation data of advanced processes, which is beneficial to guide the research of new generation of anti-irradiation chips. In this paper, based on the GDS layout of the advanced process library, we firstly design the GDS layout hierarchy information extraction technology and implement the standard cell TCAD model automatic generation technology, then design the algorithm to generate irradiation parameters for heavy ion bombardment simulation experiments, and finally analyze the experimental data to establish the irradiation database. The experimental results show that it is feasible to establish an automatic irradiation data acquisition scheme based on the GDS layout of the advanced process library.","PeriodicalId":305812,"journal":{"name":"International Conference on Electronic Information Technology","volume":"127 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-08-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129735306","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on classification of weathered glass based on logistic regression","authors":"Chi Zhang, Yuewen Li, Hao Zheng","doi":"10.1117/12.2685513","DOIUrl":"https://doi.org/10.1117/12.2685513","url":null,"abstract":"In order to classify glass artifacts into different categories based on two characteristics: the chemical composition of the sampling points and whether they are weathered or not, this paper is divided into two parts. In the first part, the entire dataset is divided using data preprocessing, and a logistic regression model is constructed for binary classification. The optimal parameters of the model are estimated using maximum likelihood estimation and gradient descent algorithm. The aim is to explore the classification patterns of the two types of glass artifacts. In the second part, unsupervised learning k-means algorithm is used for clustering. Indicators are selected based on mean square error and confidence level. The same model as in the first part is used to test the effectiveness of sub-classification. The results show that glass artifacts can be divided into two main categories: high-potassium glass and lead-barium glass, and further subdivided into 14 subcategories.","PeriodicalId":305812,"journal":{"name":"International Conference on Electronic Information Technology","volume":"20 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-08-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132360680","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Retinal vessel segmentation method based on improved U-Net","authors":"Yan Zhang, Ke Cheng, Pengcheng Lu","doi":"10.1117/12.2685728","DOIUrl":"https://doi.org/10.1117/12.2685728","url":null,"abstract":"Blood vessels are the main anatomical structure of the fundus retina. Retinal blood vessel segmentation images have been widely used in the judgment of cardiovascular and cerebrovascular diseases and retinal diseases. Therefore, appropriate fundus retinal blood vessel segmentation method is of great significance for the detection of retinal diseases. Based on U-Net, the original convolution structure in the encoding part is replaced by the Res-Se module, and the CBAM module is introduced in the skip connection part to achieve fine-grained feature fusion, thereby improving the network's ability to segment the subtle features of retinal vessels. Experiments on the CHASEDB1 dataset show that the proposed model has certain improvements in accuracy, sensitivity, and specificity indicators. This model can more accurately segment retinal vessels and demonstrate better segmentation performance.","PeriodicalId":305812,"journal":{"name":"International Conference on Electronic Information Technology","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-08-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132795428","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Permanent magnet synchronous motor drive system based on wireless power transmission technology","authors":"Yang Liu","doi":"10.1117/12.2685700","DOIUrl":"https://doi.org/10.1117/12.2685700","url":null,"abstract":"Permanent magnet synchronous motor has the advantages of small size, low loss and high-power density. It has been widely concerned and used more and more in real life. This paper proposes a permanent magnet synchronous motor drive system based on wireless power transmission, introduces wireless power transmission technology into the motor drive system, and further broadens the application range of permanent magnet synchronous motor. The main contents of this article include the composition and principle of each part of the system, builds the system simulation, and gives the simulation results. The results show that the system is feasible.","PeriodicalId":305812,"journal":{"name":"International Conference on Electronic Information Technology","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-08-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114494132","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on pure azimuth passive positioning of UAV based on iterative algorithm","authors":"Guo Hong, Huibing Yang, Jing Sun, Jiahui Zhang, Mente Wang, Jiaxiang Fang","doi":"10.1117/12.2685844","DOIUrl":"https://doi.org/10.1117/12.2685844","url":null,"abstract":"When the UAV cluster is attempting formation flight, electromagnetic silence should be maintained as much as possible to avoid external interference, and few electromagnetic wave signals should be emitted outward. In order to maintain the formation, a purely azimuthal passive positioning method is proposed to adjust the position of UAVs. In order to reduce the deviation of the UAVs from the ideal position, we first establish an optimization model by finding the closest position to the ideal coordinates of each receiving UAV under the constraint rule as the objective function, and use the signal UAV traversable coordinates as the constraint, establish an iterative optimization distance model, and use the traversal algorithm and iterative algorithm to find out the ideal position of the UAV under the constraint, and finally be able to reduce the total actual deviation of the UAV to about 0.159 m.","PeriodicalId":305812,"journal":{"name":"International Conference on Electronic Information Technology","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-08-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134058962","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research and exploration of simulation routing algorithm based on computer deep learning fuzzy logic","authors":"Long Ma, N. Tang","doi":"10.1117/12.2686268","DOIUrl":"https://doi.org/10.1117/12.2686268","url":null,"abstract":"With the concept of \"smart city\", intelligent transportation system has become particularly important in the city. Bicycle sharing system, as a part of intelligent transportation system, is developing extremely fast nowadays. However, the topology of the current bike-sharing network is relatively simple and the transmitted data is single, and there is no unified scheme for sensing multi-source big data. In this paper, a network structure applicable to bicycle sharing is proposed and studied based on it. By studying the bike-sharing system, we analyze it in different application scenarios and explore its potential value. Therefore, this paper presents the future application scenarios of shared bikes under different situations. In this paper, a multi-hop routing algorithm based on genetic algorithm for split-cluster is proposed. For the characteristics of shared bike mobility, the algorithm adds a random speed factor in cluster head election and uses genetic algorithm for optimal path selection during data forwarding. Comparing the genetic algorithm-based cluster routing algorithm with the classical LEACH algorithm and CECA algorithm with under the same conditions, it is found that the algorithm proposed in this paper can slow down the node death process and thus improve the network performance.","PeriodicalId":305812,"journal":{"name":"International Conference on Electronic Information Technology","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-08-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133947541","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Object detection based on image pyramid feature fusion and shared detection head","authors":"Xiao-Sa Liu, Siyao Chen","doi":"10.1117/12.2685780","DOIUrl":"https://doi.org/10.1117/12.2685780","url":null,"abstract":"In the object detection, the processing of feature fusion and the structure of detection head have an important impact on the detection performance. The current detectors often use the detection pipeline of ‘backbone-feature fusion network-head’. We first propose the Feature Fusion (FF), which constructs a lightweight branching network based on the image pyramid and fuses its extracted features with those of the backbone network, providing a new idea for the focus of feature fusion. In addition, we design the Shared Detector Head (SDH). The main purpose of SDH is to reduce the inconsistency of predictions on feature maps between classification and regression tasks, enhance the interaction between the two, and enhance the detection performance. Our experiments on MS COCO2017 and PASCAL VOC0712 datasets support the above analysis. Based on the above improvements, our approach achieves 0.8% mAP improvements on MS COCO2017. The above experiments prove the effectiveness of our approach.","PeriodicalId":305812,"journal":{"name":"International Conference on Electronic Information Technology","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-08-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133146480","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A method for the detection of electricity theft behavior based on Xavier weight initialization","authors":"J. Liang","doi":"10.1117/12.2685710","DOIUrl":"https://doi.org/10.1117/12.2685710","url":null,"abstract":"With the advancement of machine learning technology, intelligent detection of electricity theft has become a more widely used technical means. The detection of electricity theft behavior includes data collection, data preprocessing, establishment of electricity theft model and online detection process of electricity theft, in which the establishment of the electricity theft model is modeled by neural network, and the random initialization method and Xavier weight initialization method are used in the modeling process. Experiments show that the Xavier weight initialization method has a good effect on error histogram and network performance, and the mean squared normalization error of 0.0686 is lower than that of the stochastic optimization method.","PeriodicalId":305812,"journal":{"name":"International Conference on Electronic Information Technology","volume":"121 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-08-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121913990","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design and implementation of wind resistance load testing system for electronic water pumps","authors":"Z. Huang, Tao Huang","doi":"10.1117/12.2685722","DOIUrl":"https://doi.org/10.1117/12.2685722","url":null,"abstract":"Aiming at the limitation of factory testing of electronic water pump, the wind resistance load testing system of electronic water pump with gas as medium, combined with STM32 embedded system and various sensors is designed. The hardware part adopts STM32 as the main control chip, and designs the corresponding control circuit and signal acquisition circuit, and develops the corresponding upper computer software combined with VS2017 and QT framework, so as to realize the system automatic test. The system performs pump testing by applying reverse airflow, with fast testing rate and no additional pump cleaning work after the test is completed, which improves the efficiency of pump factory testing.","PeriodicalId":305812,"journal":{"name":"International Conference on Electronic Information Technology","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-08-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124735900","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Fengjiao Gao, Yumo Zhang, Tongjun Liu, Changjiang Song
{"title":"A vehicle re-identification method based on random occlusion","authors":"Fengjiao Gao, Yumo Zhang, Tongjun Liu, Changjiang Song","doi":"10.1117/12.2685756","DOIUrl":"https://doi.org/10.1117/12.2685756","url":null,"abstract":"In the computer vision field, vehicle re-identification research is an important direction. There have been many researchers doing research on vehicle re-identification. But they mostly focus on the overall image and ignore occluded images, which may be more practical and challenging. This paper proposed a re-identification method to solve the occlusion in remote sensing image, which extracted the pixels in the random rectangular area of the image and covers them to other positions of the image. The feasibility of the proposed random occlusion method was proved by experiments on simulated occlusion images. And experiments on real occlusion image data sets showed that the proposed random occlusion method was better than the random erasure method in solving the occlusion problem, and can obtain better re-identification results.","PeriodicalId":305812,"journal":{"name":"International Conference on Electronic Information Technology","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-08-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124187060","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}