{"title":"Structured Compressed Sensing of Double Selective Channel for High-Frequency OFDM Systems","authors":"Wang Kai, Jingzhi Liu, L. Haibo, Fengbin Zhang","doi":"10.1109/ICEIEC49280.2020.9152331","DOIUrl":"https://doi.org/10.1109/ICEIEC49280.2020.9152331","url":null,"abstract":"In order to realize the real-time acquisition of the state information of the double selective channel with low pilot cost, a structured compressed sensing (SCS) based channel estimation method is proposed for high-frequency (HF) in this paper. Combining with the transmission model and sky wave channel model of HF OFDM systems, the channel estimation problem is formulated under the framework of compressed sensing. The block-structured sparsity of channel coefficients in transformed domain of double selective sky wave channel is proved. On this basis, the channel coefficients are reconstructed by structured compressed sensing algorithm. Simulation results show that the proposed structured compression sensing method can significantly reduce the pilot overhead and ensure the accuracy of channel estimation.","PeriodicalId":352285,"journal":{"name":"2020 IEEE 10th International Conference on Electronics Information and Emergency Communication (ICEIEC)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123435165","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Convolutional Neural Network based Matchmaking for Service Oriented System Construction","authors":"Junju Liu","doi":"10.1109/ICEIEC49280.2020.9152343","DOIUrl":"https://doi.org/10.1109/ICEIEC49280.2020.9152343","url":null,"abstract":"In recent years, service-oriented computing, as a new computing paradigm, has been developed rapidly. Following this trend, more and more Web services and cloud services have been developed and made publicly available on the Web. These publicly available services will be important components for service-oriented system construction. However, these large numbers of services increase the burden of service selection in service-oriented system construction. This paper proposes a convolutional neural network-based service matchmaking approach to match services according to developer requests in service-oriented system construction. In the model, the convolutional neural network aims to learn the semantic feature representation for matchmaking. We experimented on a real-world dataset, ProgammableWeb.com, and experiment results show that the proposed approach can help find relevant services according to developer requests.","PeriodicalId":352285,"journal":{"name":"2020 IEEE 10th International Conference on Electronics Information and Emergency Communication (ICEIEC)","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123305724","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Optimized Unequal APSK Constellation Mapping and Demapping for Non-equiprobable Transmission Systems","authors":"Yuanfang Xie, Can Zhang, Kenan Zhang, Lei Hou","doi":"10.1109/ICEIEC49280.2020.9152321","DOIUrl":"https://doi.org/10.1109/ICEIEC49280.2020.9152321","url":null,"abstract":"Amplitude phase shift keying(APSK) is an emerging modulation scheme due to its considerable shaping gain. In this paper, unequal APSK constellation mapping aiming at non-equiprobable transmission system is concerned. A simplified and optimized mapping and demapping method for non-equiprobable symbols’ transmission is proposed. Simulation results show that the proposed mapping and demapping method outperforms conventional constellations and mappings.","PeriodicalId":352285,"journal":{"name":"2020 IEEE 10th International Conference on Electronics Information and Emergency Communication (ICEIEC)","volume":"140 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126543356","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on Teachers’ Behavior in the Class Recognition on Based on Text Classification Technology","authors":"Qing Han, L. Luo, Zhong Sun","doi":"10.1109/ICEIEC49280.2020.9152304","DOIUrl":"https://doi.org/10.1109/ICEIEC49280.2020.9152304","url":null,"abstract":"Teachers’ behavior in the classroom is the key factor that affects the quality of teaching and students’ learning. In order to improve the accuracy of teachers’ behavior in the classroom recognition, this study uses multiple in-depth learning models to identify teachers’ behavior in the classroom. Before the experiment, the teacher’s behaviors are marked and classified. The teacher’s speech is divided into sentences as the experimental data. The experiments use the model of deep learning technology for classification. Finally, by comparing the indicators in each model, this paper verifies that the use of deep learning technology can effectively and automatically identify teachers’ teaching behavior in the class and realize the automatic classification of classroom teachers’ behavior. The research shows that the use of deep learning text classification technology to identify teacher behavior can significantly reduce the cost of classroom teacher behavior analysis, improve the efficiency and timeliness of analysis.","PeriodicalId":352285,"journal":{"name":"2020 IEEE 10th International Conference on Electronics Information and Emergency Communication (ICEIEC)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125801140","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"[ICEIEC 2020 Front Matter]","authors":"","doi":"10.1109/iceiec49280.2020.9152314","DOIUrl":"https://doi.org/10.1109/iceiec49280.2020.9152314","url":null,"abstract":"","PeriodicalId":352285,"journal":{"name":"2020 IEEE 10th International Conference on Electronics Information and Emergency Communication (ICEIEC)","volume":"122 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132634611","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Experimental Evaluation of the Defense Capability of ARM-based Systems against Buffer Overflow Attacks in Wireless Networks","authors":"Sun Zhou, Jun Chen","doi":"10.1109/ICEIEC49280.2020.9152302","DOIUrl":"https://doi.org/10.1109/ICEIEC49280.2020.9152302","url":null,"abstract":"Buffer overflow attack is one of the mainstream attacks towards the ARM architecture. It may lead to consequences such as program failure or system privileges loss. The mainstream operating systems deploy multiple defense mechanisms to mitigate such attacks. However, so far there are few reports on evaluation of the defense capability of ARM-based operating systems from buffer overflow attacks. In this paper, firstly, we implemented the Runtime Intrusion Prevention Evaluator on ARM-based operating systems, which we called RIPE-ARM. In that evaluator, 850 kinds of effective buffer overflow attacks are integrated for test. Secondly, by using the QEMU virtual machine, an ARM-based system, Raspberry Pi, was set up for the experiment; and then, the RIPE-ARM was used to test and evaluate the defense capability of Raspberry Pi. We identified the kinds of attacks that each defense or defense combination can successfully prevent, respectively. Among all the defense methods, the Canary + DEP combination turns out to be optimal that is able to make 840 out of the total 850 kinds of attacks fail. Furthermore, for comparison, the defense capability of Ubuntu 16.04 LTS system based on X86 architecture was also tested. The results show that the optimal defense method of that system can prevent only 790 attack kinds.","PeriodicalId":352285,"journal":{"name":"2020 IEEE 10th International Conference on Electronics Information and Emergency Communication (ICEIEC)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133701315","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Text Generation and Prediction System: Pre-training on New Corpora Using BERT and GPT-2","authors":"Yuanbin Qu, Peihan Liu, Wei Song, Lizhen Liu, Miaomiao Cheng","doi":"10.1109/ICEIEC49280.2020.9152352","DOIUrl":"https://doi.org/10.1109/ICEIEC49280.2020.9152352","url":null,"abstract":"Using a given starting word to make a sentence or filling in sentences is an important direction of natural language processing. From one aspect, it reflects whether the machine can have human thinking and creativity. We train the machine for specific tasks and then use it in natural language processing, which will help solve some sentence generation problems, especially for application scenarios such as summary generation, machine translation, and automatic question answering. The OpenAI GPT-2 and BERT models are currently widely used language models for text generation and prediction. There have been many experiments to verify the outstanding performance of these two models in the field of text generation. This paper will use two new corpora to train OpenAI GPT-2 model, used to generate long sentences and articles, and finally perform a comparative analysis. At the same time, we will use the BERT model to complete the task of predicting intermediate words based on the context.","PeriodicalId":352285,"journal":{"name":"2020 IEEE 10th International Conference on Electronics Information and Emergency Communication (ICEIEC)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114207998","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Improving CIMDE with An Mixed Selection Method","authors":"Chen Dan, Xia Da-hai, Xiong Cai-quan, Gu Wei","doi":"10.1109/ICEIEC49280.2020.9152316","DOIUrl":"https://doi.org/10.1109/ICEIEC49280.2020.9152316","url":null,"abstract":"Differential evolution(DE) is a popular evolution algorithm. How to select individuals for mutation operators is a very critical problem. Many researchers proposed improved mutation operators by selecting more outstanding individuals to produce mutated vectors. Collective information-powered mutation operator based differential evolution(CIMDE) proposed an improved collective information-powered mutation operator that uses multiple outstanding individuals as the heuristic information to release the selection pressure. But we observed that the mutation operator will be easily trapped into stagnation. So an improved mixed mutation operator named “current or rand-to-ci_ m best/1” is proposed to help individuals to departure from stagnation. Experiments show that this operator can improve the performance of the algorithm on CEC2013 bentmark functions.","PeriodicalId":352285,"journal":{"name":"2020 IEEE 10th International Conference on Electronics Information and Emergency Communication (ICEIEC)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131470653","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on Application and Deployment of UAV in Emergency Response","authors":"Wenbo Jin, Jixing Yang, Yudong Fang, Wenchuan Feng","doi":"10.1109/ICEIEC49280.2020.9152338","DOIUrl":"https://doi.org/10.1109/ICEIEC49280.2020.9152338","url":null,"abstract":"With the continuous development and maturity of related technologies in recent years, unmanned aerial vehicles (UAVs) are increasingly used in the fields of industry and public safety. This article first discusses the various demands for the emergency response mechanism. Next, a capability matrix of UAVs and payloads is created comprising various capacities required in response to various disasters and accidents. Combining the regional disaster susceptibility, traffic inconvenience index and terrain complexity coefficient, recommendations are further provided for the deployment of UAVs and payloads in various regions. Based on the above analysis, this article finally puts forward suggestions on the application of UAVs in implementing emergency response mechanism.","PeriodicalId":352285,"journal":{"name":"2020 IEEE 10th International Conference on Electronics Information and Emergency Communication (ICEIEC)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125715933","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Using a Pre-Trained Language Model for Medical Named Entity Extraction in Chinese Clinic Text","authors":"Mengyuan Zhang, Jin Wang, Xuejie Zhang","doi":"10.1109/ICEIEC49280.2020.9152257","DOIUrl":"https://doi.org/10.1109/ICEIEC49280.2020.9152257","url":null,"abstract":"The implementation of name entity recognition (NER) in Chinese clinic text is challenging. These methods have several limitations, such as the complexity of the medical text structure, the vast difference in entity length, and identical entities with different entity categories in different contexts. To address these problems, we propose a combination model of both pre-trained bi-directional long short-term memory (Bi- LSTM) and the conditional random field (CRF) model. Due to the specification of medical texts, we do not employ Chinese word segmentation tools. A character-level feature is introduced as an input feature, which is subsequently mapped into char embeddings by using an embedding layer of the bi-directional encoder representation from transformers (BERT) model. A BiLSTM layer and a CRF are utilized to encode the char embeddings and output the final label. The experiments are conducted with CNMER2019 to evaluate the performance and compared with several previous models. The results show that the proposed model outperformed other models and achieved better performance with NER in Chinese clinic text.","PeriodicalId":352285,"journal":{"name":"2020 IEEE 10th International Conference on Electronics Information and Emergency Communication (ICEIEC)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126893576","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}