{"title":"Speech emotion recognition based on SE-ResNet","authors":"Hai Su, Peng Liu, Songsen Yu, Shanxiao Yang","doi":"10.1117/12.2653769","DOIUrl":"https://doi.org/10.1117/12.2653769","url":null,"abstract":"Emotion recognition plays an important role in the field of human-computer interaction. It can help robots understand human needs more accurately. However, the impact of noise signal and model architecture on accuracy has not been fully explored. In addition, individual datasets are often used for algorithm testing, making it challenging to ensure algorithm generalization. To address these issues, we explore the impact of noise and algorithms on emotion recognition tasks based on two datasets. First, we use SE-ResNet as an emotion recognition network, which guarantees the effectiveness of the algorithm through the attention mechanism and residual structure. Experiments show that SE-ResNet performs better than other classical convolutional neural networks, and it validates the effectiveness of the attention mechanism. Second, we verify that noise can cause the algorithm to lose accuracy by setting up experiments with or without noise. Besides that, we analyze noise’s effect for each emotion class by the confusion matrix. The results show that noise has the most significant impact on the recognition accuracy of natural emotion.","PeriodicalId":32903,"journal":{"name":"JITeCS Journal of Information Technology and Computer Science","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90422222","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design and performance study of 4G communication system based on srsRAN","authors":"X. Ye","doi":"10.1117/12.2653437","DOIUrl":"https://doi.org/10.1117/12.2653437","url":null,"abstract":"In order to realize the flexible construction and performance test of 4G communication system, in this paper, using the GPP (General Purpose Processor) and USRP as the hardware platform of Software Defined Radio (SDR), based on the open source srsRAN software platform, the 4G communication link is built which realizes UE accessing the Internet. Firstly, the peak rate of the system based on the RE algorithm is studied, and the influencing factors of the peak rate are analyzed. Secondly, the uplink and downlink peak rate of the 4G link is measured by the two transmission modes of antenna and coaxial cable respectively. After comparative analysis, it can be concluded that the transmission mode of coaxial cable is more stable and the SNR (Signal to Noise Ratio) is better. At the same time, it verifies that CPU performance affects uplink and downlink peak rates, and that adjusting the RF (Radio Frequency) gain can achieve the maximum throughput which is also consistent with the theoretical value of peak rates.","PeriodicalId":32903,"journal":{"name":"JITeCS Journal of Information Technology and Computer Science","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74297292","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Implementation of marine CAD parametric drawing system based on configuration method","authors":"Feng Sun, Jianhui Zhou, Hao Shi, Shuai Shen","doi":"10.1117/12.2653795","DOIUrl":"https://doi.org/10.1117/12.2653795","url":null,"abstract":"In order to solve the problems in the programming of traditional marine CAD parametric drawing system, such as heavy workload of development and debugging, long period of modification and adjustment, and weak universality of the system, this paper adopts the development concept of configuration, uses the existing drawing files to quickly construct the command stream template file of parametric drawing, and automatically constructs the parameter input interface of the parametric drawing system based on the template file A more general CAD parametric drawing system is designed and implemented. The application of the method in the actual ship shafting design project shows that the method can quickly construct the CAD parametric drawing system of characteristic objects and improve the efficiency of related work.","PeriodicalId":32903,"journal":{"name":"JITeCS Journal of Information Technology and Computer Science","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72771998","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research and analysis of taxi decision-making problem","authors":"Rubo Sun, Sunyan Hong, Jiang Liu, Fei Deng, Zhenting Chen, Bo Duan","doi":"10.1117/12.2653756","DOIUrl":"https://doi.org/10.1117/12.2653756","url":null,"abstract":"At present, taxi is one of the main transportation modes for passengers to arrive at their destination, and its convenience is increasingly becoming an important transportation mode in many cities. However, taxis queue up for passengers or passengers queue up to take the bus from time to time. Based on this problem, this paper establishes a corresponding mathematical model to analyze the taxi driver's selection strategy after sending passengers to the airport, so that the taxi driver can improve the efficiency of passengers as much as possible, so as to increase the available income. Firstly, in order to further put forward the selection strategy of taxi drivers, this paper reflects the driver's income according to the passenger mileage, no-load mileage, no-load rate and passenger carrying rate of taxis in different periods, and makes a selection strategy for taxi drivers from the aspect of maximum income. Finally, in order to consider the fairness of the airport taxi industry and make the income of these taxis as balanced as possible, we analyze and study from the two aspects of \"short distance vehicles\" and \"long distance vehicles\", and solve the problem of \"boarding points\" by setting up non passable lanes to improve the efficiency of the airport.","PeriodicalId":32903,"journal":{"name":"JITeCS Journal of Information Technology and Computer Science","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75867707","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Recognition of notational notation based on convolutional neural network","authors":"Zhaoyong Fan, Shuang Chen","doi":"10.1117/12.2653861","DOIUrl":"https://doi.org/10.1117/12.2653861","url":null,"abstract":"Aiming at the complex recognition process of numbered musical notes in traditional methods and the low recognition accuracy, a method for recognition of musical notes based on convolutional neural network is proposed. Based on the structural characteristics of the notational notes, a single-input and three-output note recognition network model is established. The convolutional neural network is trained using sample images containing note information labels to obtain a note image recognition model. The training results show that the accuracy of the model and the change trend of the loss value perform well. In order to test the practicability of this method, the numbered musical notes of some songs were recognized and compared with other methods. The results show that this method has high recognition accuracy and fast recognition speed, which proves the validity and practicality of the recognition model.","PeriodicalId":32903,"journal":{"name":"JITeCS Journal of Information Technology and Computer Science","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72386894","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on security defect assessment technology for Java source code","authors":"Dongyang Cai, Yue Sun, Xiaolong Su, Yongmin Cao","doi":"10.1117/12.2653742","DOIUrl":"https://doi.org/10.1117/12.2653742","url":null,"abstract":"In recent years, with the rapid development of technology fields such as big data, cloud computing, Internet of Things, and mobile Internet, security incidents such as network attacks and data information leakage have occurred frequently, which shows that the current information system falls in the serious security situation, and methods relying on the traditional security protection mechanism to ensure information security has gradually become inadequate. Compared with other software languages, Java language is widely used in the development of large-scale business systems due to its high access, concurrency, and clustering. Source code is the basic element of building a business application system, and logic vulnerabilities or nonstandard programming in code are the roots of application security events. This paper proposes a source code security defect assessment method based on the entropy weight method by deeply analyzing the Java source code security defect detection and repair methods.","PeriodicalId":32903,"journal":{"name":"JITeCS Journal of Information Technology and Computer Science","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77602777","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Zhao, Dongming Liu, J. Zhang, Zhongyun Liu, Licheng Qiao
{"title":"A fast two-parameter test system based on combined FBG","authors":"S. Zhao, Dongming Liu, J. Zhang, Zhongyun Liu, Licheng Qiao","doi":"10.1117/12.2653899","DOIUrl":"https://doi.org/10.1117/12.2653899","url":null,"abstract":"Strain and temperature are two main parameters in fiber grating system, while there are cross-sensitive problems. In order to obtain this two-parameter at the same time, and to reduce its influence, a test system based on combined FBG is designed. Based on different effect of different core diameter strain, a kind of FBG probe is studied. On the basis of calculating the relationship between wavelength offset and the strain and temperature, the correlation function is deduced, and the coupling mode of the probe and the coupling efficiency are analyzed. In the experiment, strain and temperature test were completed by using light source, transmission fiber, combined FBG and so on. The results show that the wavelength offset is basically the same when the FBG changes with temperature. However, the slope change is quite different when stress changes. Finally, the strain and temperature were tested under different conditions, and the response coefficients of FBG temperature and strain were calibrated. It can be seen that the simultaneous analysis of temperature and strain can be achieved by detecting wavelength offset of combined FBG. The design is no need to weld, taper and other complex technologies. It has simple structure, strong capacity expansion capability and has high application value.","PeriodicalId":32903,"journal":{"name":"JITeCS Journal of Information Technology and Computer Science","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78386186","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A novel convolutional neural network for gesture recognition","authors":"Yuhui Xiong, Xiaofu Du, Xinghan Huang, Hedan Liu","doi":"10.1117/12.2653464","DOIUrl":"https://doi.org/10.1117/12.2653464","url":null,"abstract":"Gesture recognition, as an important means of human-computer interaction, can achieve more natural and flexible human-computer interaction, so it has been widely concerned by researchers in the field of computer vision. At present, most gesture recognition algorithms are based on monocular visual images and recognize the apparent features of hands. Most gesture image segmentation methods are carried out in color space according to skin color information. These methods are highly susceptible to interference from the external environment, such as lighting, background, etc. Convolutional neural network has the advantages of strong anti-interference and outstanding self-organization and self-learning ability. Therefore, based on the principle of convolutional neural network, a novel deep convolutional neural network dedicated to gesture recognition was designed in this paper. This network combines skin color information with finger position information for gesture recognition. Experimental results showed that the algorithm based on fingertip position information has better performance than the algorithm based solely on skin color information. Moreover, the network has simple structure and few parameters. Compared with VGG16 and other classical networks, the recognition accuracy is basically the same under the premise of fewer parameters and structural layers, and the recognition effect is better than other classical networks.","PeriodicalId":32903,"journal":{"name":"JITeCS Journal of Information Technology and Computer Science","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78624660","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Obstruction avoidance path planning of unmanned surface vehicle based on Dijkstra self-optimization model","authors":"Qilong Chen, Pengfei Huang","doi":"10.1117/12.2653458","DOIUrl":"https://doi.org/10.1117/12.2653458","url":null,"abstract":"In order to generate an obstruction avoidance path for unmanned surface vehicle, the Dijkstra self-optimization model is proposed in this paper. First, a Maklink undirected graph is generated according to the starting point, ending point, and obstructions, the Dijkstra algorithm is used to generate an initial path to avoid obstructions. Second, a directed graph is generated based on the initial path, the Dijkstra algorithm is used to generate the optimal path with the shorter length. The experimental results show that the Dijkstra self-optimization model can generate the shortest path to avoid obstructions. Compared with the Maklink+ACO model, this model has smaller time complexity and is the optimal solution.","PeriodicalId":32903,"journal":{"name":"JITeCS Journal of Information Technology and Computer Science","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89186774","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Huabing Zhang, Xiaoming Cao, Lihao Wei, Zhidan Lin
{"title":"Design and research on safety management and control system of fort machine technology operation and maintenance","authors":"Huabing Zhang, Xiaoming Cao, Lihao Wei, Zhidan Lin","doi":"10.1117/12.2654126","DOIUrl":"https://doi.org/10.1117/12.2654126","url":null,"abstract":"At present, people attach great importance to information security issues, and the implementation of different security level protection systems continues to deepen. However, some internal networks still need to face various forms of information security issues in the actual trial process. Based on the above content, this paper studies the design of the technical operation and maintenance safety management and control system of fort-and-fort machine, analyzes the main contents of the system design. At the same time, this paper also summarizes the relevant experience, hoping to provide a reasonable reference for workers in the same field.","PeriodicalId":32903,"journal":{"name":"JITeCS Journal of Information Technology and Computer Science","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86865980","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}