{"title":"Blind source separation of electromagnetic signals based on one-dimensional U-Net","authors":"Yang Chen, Jinming Liu, Jian Mao","doi":"10.1145/3573428.3573709","DOIUrl":"https://doi.org/10.1145/3573428.3573709","url":null,"abstract":"Digital electronic equipment emits electromagnetic signals under working conditions, resulting in information leakage and a serious threat to information security. To explore the extent of leakage of important information, blind source separation techniques are used to separate and detect mixed electromagnetic radiation signals. Deep learning techniques provide a feasible option for blind source separation detection of electromagnetic signals in noisy environments. In this paper, we use a one-dimensional u-net to blindly separate the electromagnetic signals leaked by the LCD display. Experiments show that the one-dimensional U-Net with five layers of ELU activation function has the best performance.","PeriodicalId":314698,"journal":{"name":"Proceedings of the 2022 6th International Conference on Electronic Information Technology and Computer Engineering","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122199080","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on LOD Lightweight Method of Railway Four Electric BIM Model","authors":"J. Huo, Jinqu Liu, Guanxiang Pei, Tingjuan Wang","doi":"10.1145/3573428.3573514","DOIUrl":"https://doi.org/10.1145/3573428.3573514","url":null,"abstract":"In view of the current BIM data volume, poor real-time rendering effect, and other problems. This paper proposes a research method to convert the BIM model of the four railways from RVT format to the 3DTiles data format and display it on the Web side with multiple LOD. The method is based on the secondary development of Revit to write a plug-in program, and realizes the application of the railway four-electrical model through lightweight model, model format conversion, and data dynamic scheduling. Firstly, the RVT model is converted to OBJ as an intermediate model through the secondary development of Revit. Then, the model is simplified to different degrees by the improved edge folding algorithm, to achieve the purpose of lightweight model. Finally, convert the simplified model to 3DTiles format, set the geometric error size, determine the LOD level, and introduce the Frustum Culling to achieve dynamic LOD display. Taking the model in railway engineering as an example, a high-speed railway station and components are selected for experimental analysis. The research results show that the proposed four-electric BIM model lightweight method can reduce the amount of model data as needed, and improve the real-time rendering efficiency and optimize the loading effect under the Cesium framework.","PeriodicalId":314698,"journal":{"name":"Proceedings of the 2022 6th International Conference on Electronic Information Technology and Computer Engineering","volume":"38 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114098350","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Study on Fractal Dimension modified MFCC","authors":"Pan Mi, Li Wang","doi":"10.1145/3573428.3573436","DOIUrl":"https://doi.org/10.1145/3573428.3573436","url":null,"abstract":"MFCC is widely used in the field of voiceprint recognition, and has achieved remarkable effects. However, MFCC focuses on the short-term spectrum characteristics of speech, while ignoring the self-similarity of speech itself. Fractal has the self-similarity characteristic of non-integer dimension. It is often used to describe the evolution of nature, such as Brownian motion, coastline, rock strata and minerals. Based on MFCC, we try to introduce fractal dimension, which makes up for the lack of self-similarity of MFCC. The experimental results show that compared with MFCC, the fractal dimension modified MFCC (FDMFCC) has improved accuracy and stability.","PeriodicalId":314698,"journal":{"name":"Proceedings of the 2022 6th International Conference on Electronic Information Technology and Computer Engineering","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121225944","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on Reconstruction Algorithm of Blast Furnace Throat Temperature Field","authors":"Xiaoyu Luo, Piliang Liu, Guimei Cui, Tongxin Nan","doi":"10.1145/3573428.3573761","DOIUrl":"https://doi.org/10.1145/3573428.3573761","url":null,"abstract":"Aiming at the obvious limitations of the traditional blast furnace temperature measurement, such as slow response speed, easy damage, and inconvenient replacement, a non-contact ultrasonic measurement technology is proposed. The energy detector uses classical least squares to reconstruct the temperature field. Due to the problem of missing edge information, Kriging interpolation and radial basis interpolation are used to extrapolate and predict the edge temperature information. The basis interpolation method has a slight advantage. Looking at the number of installations, when 8 ultrasonic transducers are installed, the reconstruction accuracy is ideal, which proves the feasibility of the scheme.","PeriodicalId":314698,"journal":{"name":"Proceedings of the 2022 6th International Conference on Electronic Information Technology and Computer Engineering","volume":"194 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116672351","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"MATLAB-Based App for Handwritten Numeral Recognition","authors":"Yongzhe Wang","doi":"10.1145/3573428.3573485","DOIUrl":"https://doi.org/10.1145/3573428.3573485","url":null,"abstract":"Handwritten numeral recognition (HNR) is widely used in various industries and is essential to the research and development of optical character recognition (OCR) technology. Given that most of the current HNR algorithms require high-quality input images rather than naturally taken photographs, a MATLAB-based application with a graphical user interface (GUI) is designed for pre-processing and segmenting photographs of handwritten numerals and then recognizing the numerals. For the various conditions that a naturally taken a photograph may have in practice, the application can perform denoising, perspective correction, and binarization of the original image, as well as removing horizontal lines, grids, or boxes from the background. The application can then segment and recognize every numeral from the processed image. It has been experimentally verified that the application can satisfactorily pre-process the original image while providing high accuracy in recognizing numerals.","PeriodicalId":314698,"journal":{"name":"Proceedings of the 2022 6th International Conference on Electronic Information Technology and Computer Engineering","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121712385","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"DEPA: Determining Exploit Primitives Automatically for Interactive Programs","authors":"Jie Liu, Hang An, Jin Li, Hongliang Liang","doi":"10.1145/3573428.3573550","DOIUrl":"https://doi.org/10.1145/3573428.3573550","url":null,"abstract":"Automated Exploit Generation (AEG) is a well-known difficult task, especially for heap vulnerabilities. The premise of this task is the determination of exploit primitives, and prior research efforts for exploit primitive determination are usually based on vulnerability identification. However, it is not always easy to discovery bugs using fuzzing or symbolic technologies for some programs. In this paper, we present a solution DEPA to determine exploit primitives based on primitive-crucial-behavior model for heap vulnerabilities. The core of DEPA contains two novel techniques, 1) primitive-crucial-behavior identification through pointer dependence analysis, and 2) exploit primitive determination method which includes triggering both vulnerabilities and exploit primitives. We evaluate DEPA on real-world CTF (capture the flag) programs with heap vulnerabilities and DEPA can discovery arbitrary write and arbitrary jump exploit primitives for some programs except for program multi-heap. Results showed that primitive-crucial-behavior identification and determining exploit primitives are accurate and effective by using our approach. In addition, DEPA is superior to the state-of-the-art tools in determining exploit primitives for the heap internal overflow vulnerability.","PeriodicalId":314698,"journal":{"name":"Proceedings of the 2022 6th International Conference on Electronic Information Technology and Computer Engineering","volume":"32 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123799954","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yuechao Zheng, D. Hu, Chongning Zhao, Yunpeng Jia, Xintian Zhou, Yu Wu, Ting Li
{"title":"Simulation study of 1200V SiC-based trench-gate MOSFET with vertical field plate protection","authors":"Yuechao Zheng, D. Hu, Chongning Zhao, Yunpeng Jia, Xintian Zhou, Yu Wu, Ting Li","doi":"10.1145/3573428.3573535","DOIUrl":"https://doi.org/10.1145/3573428.3573535","url":null,"abstract":"In this paper, a new structure of SiC-base trench-gate MOSFET protected by vertical field plate is proposed. Compared with conventional trench gate MOSFET, a deep trench connected to the source is added. The source trench is filled with polysilicon and acts as a vertical field plate. Under blocking state, the depletion charge between trenches is coupled with the vertical field plate, which can modify the electric field distribution near the gate oxide corner. Lower field strength in gate-oxide is the guarantee for long-term reliable operation of the device. In order to investigate the effect of charge-coupling, double doped epitaxial drift region is selected. The doping concentration of first epi-layer is lower than that of second eip-layer. The bottom of the deep source trench, that is, the end of vertical field plate, falls at the junction for the two epitaxial layer. The static characteristics are simulated for both conventional trench gate and dual trench dual epitaxy new structures by using Sentaurus TCAD. Simulation results show that the new structure with double trenches and double epitaxy has higher Baliga's figures of merit (FOM) Also, under the blocking state, the maximum electric field in gate oxide can be lower than 5MV/cm. That is desirable for the long-term operation reliability of the gate.","PeriodicalId":314698,"journal":{"name":"Proceedings of the 2022 6th International Conference on Electronic Information Technology and Computer Engineering","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116765614","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Anti-reverberation Approach for wideband Sonar: Based on Sparse Processing","authors":"Hao Wang, Feng Wang, Yangze Dong","doi":"10.1145/3573428.3573480","DOIUrl":"https://doi.org/10.1145/3573428.3573480","url":null,"abstract":"Reverberation is the main factor that limits the detection of close-range targets by an active sonar system. In this paper, a sparse processing method of dynamic measurement vector is proposed to realize the parameter reconstruction of reverberation and target for broadband sonar scenario. In this method, the high-resolution parameters are reconstructed one by one along the coarse resolution range bin in the reverberation region, and a tolerance term is added in the iterative process of reconstruction to distinguish reverberation and target. The measurement vector is updated synchronously during the phase atom search of the dictionary matrix, which effectively overcomes the range migration of the target and reverberation. Simulation results show that the proposed method can achieve accurate reconstruction and detection of target parameters in a reverberation background.","PeriodicalId":314698,"journal":{"name":"Proceedings of the 2022 6th International Conference on Electronic Information Technology and Computer Engineering","volume":"31 6","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114045039","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Peng Sun, Hai Lin, H. Yu, You Zhong, Xiaoping Wu, Bing Sun
{"title":"Research on Service Function Chain Deployment Algorithm Based on Proximal Policy Optimization","authors":"Peng Sun, Hai Lin, H. Yu, You Zhong, Xiaoping Wu, Bing Sun","doi":"10.1145/3573428.3573766","DOIUrl":"https://doi.org/10.1145/3573428.3573766","url":null,"abstract":"In the future, business scenarios will become diversified, but it is difficult for the existing network architecture to provide strong support for them. Network function virtualization (NFV) technology decouples network functions from dedicated hardware devices and provides customized services for users in the form of service function chain (SFC). At present, the deployment of SFC has been proved to be a NP-hard problem. Most of the solutions are integer linear programming algorithms, but the process of such algorithms is complex. When the network topology scale becomes larger, the calculation process is very time-consuming, and the results sometimes fall into local optimal solutions, which makes it difficult to achieve the desired effect. In this case, reinforcement learning (RL) algorithms show great advantages, learning strategies through interaction with the environment to maximize rewards or achieve specific goals. Therefore, this paper proposes a SFC deployment algorithm based on proximal policy optimization (PPO) reinforcement learning, which aims at maximizing access rate and minimizing resource consumption. The simulation results show that the proposed algorithm has good convergence and stability, which is more conducive to the actual deployment of the SFC.","PeriodicalId":314698,"journal":{"name":"Proceedings of the 2022 6th International Conference on Electronic Information Technology and Computer Engineering","volume":"387 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113982846","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on the application of artificial intelligence algorithms in drought prediction","authors":"Mengxi Liu, Guangjun Zai, Guofu Wang, Weiwei Shi, Guanqun Zhang","doi":"10.1145/3573428.3573753","DOIUrl":"https://doi.org/10.1145/3573428.3573753","url":null,"abstract":"With the aggravation of global warming, drought has caused more and more serious impact on society and national economy, so the accurate prediction of drought is also the most important thing to deal with the frequent drought problem. On the other hand, artificial intelligence technology has shown its advantages in various fields and has a broad application prospects, so it is gradually being used in drought prediction. In this paper, drought prediction algorithms in recent years are reviewed, and existing cases of drought prediction using different arithmetic models for different drought indices are studied. The advantages and disadvantages of different algorithms are compared, the challenges of drought prediction are summarized, and the future of drought prediction is prospected.","PeriodicalId":314698,"journal":{"name":"Proceedings of the 2022 6th International Conference on Electronic Information Technology and Computer Engineering","volume":"356 7","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114008386","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}