{"title":"Intelligent Light Design Based on Arduino","authors":"Z. Wu, T. Zhou","doi":"10.1109/ICISCAE51034.2020.9236885","DOIUrl":"https://doi.org/10.1109/ICISCAE51034.2020.9236885","url":null,"abstract":"This work takes independent research and design of an intelligent light control system that can realize infrared wireless remote control of LED lamp beads. Users can use the buttons on the remote control to turn on or off the four LED lamps individually or uniformly. The remote-control distance can reach more than 10 meters. It has the characteristics of rapid and accurate control response. The implementation of this intelligent remote-control lighting system is based on the Arduino development platform. On the hardware level, the Arduino microprocessor, infrared remote-control receiver, remote control, LED light driver are constructed as independent circuit modules, and these circuits are connected in an orderly manner to build a complete hardware system. This intelligent light control system is tested during the work process and be improved for high performance. The intelligent light control system is very suitable for popularization, and it is convenient to improve the operation effect of related products.","PeriodicalId":355473,"journal":{"name":"2020 IEEE 3rd International Conference on Information Systems and Computer Aided Education (ICISCAE)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115317057","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Face Gender Recognition based on Face Recognition Feature Vectors","authors":"Yongjing Lin, Huosheng Xie","doi":"10.1109/ICISCAE51034.2020.9236905","DOIUrl":"https://doi.org/10.1109/ICISCAE51034.2020.9236905","url":null,"abstract":"Automatic facial gender recognition is a widely used task in the field of computer vision, which is very easy for a human, but very challenging for computers. In this paper, a face gender classification algorithm based on face recognition feature vectors is proposed. Firstly, face detection and preprocessing are performed on the input images, and the faces are adjusted to a unified format. Secondly, the face recognition model is used to extract feature vectors as the representation of the face in the feature space. Finally, machine learning methods are used to classify the extracted feature vector. Meanwhile, this study uses t-distributed Stochastic Neighbor Embedding (T-SNE) to visualize the face recognition feature vectors to verify the effectiveness of the face recognition feature vectors on the issue of gender classification. The proposed method has achieved a recognition rate of 99.2% and 98.7% on the FEI dataset and the SCIEN dataset, respectively. Besides, it also achieves a recognition rate of 97.4% on the Asian star face dataset, outperforming existing methods, which shows that the proposed method is helpful for the research of facial gender.","PeriodicalId":355473,"journal":{"name":"2020 IEEE 3rd International Conference on Information Systems and Computer Aided Education (ICISCAE)","volume":"338 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115529546","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Multi-Strategy Elite Ant System Algorithm for Vehicle Routing Problem with Time Window","authors":"Xu Yan, Licong Tan, Jinyong Chen, Bi Li","doi":"10.1109/ICISCAE51034.2020.9236790","DOIUrl":"https://doi.org/10.1109/ICISCAE51034.2020.9236790","url":null,"abstract":"Vehicle routing problem with time window (VRPTW), an important extension type of VRP, requires delivery within a specified time window at a minimal cost. In this paper, a multi-strategy elite ant system algorithm is proposed to improve the optimization performance of solving VRPTW. Firstly, the ant colony initialization strategy was used to set the first-deliver-customer. Secondly, mutation strategy including the mutation for the colony and the mutation for the optimal ant is proposed for improving the local search capability. Finally, the pheromone update strategy based on the pheromone reset mechanism is used to avoid a local optimum. The proposed algorithm experiment results on benchmarks of VRPTW verify the effectiveness of the algorithm.","PeriodicalId":355473,"journal":{"name":"2020 IEEE 3rd International Conference on Information Systems and Computer Aided Education (ICISCAE)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116088303","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Q. Kongjian, Zhang Tong, Guo Kuiyuan, Z. Hongwei, Wang Yu, Chen Haoxin
{"title":"The Method of Functional Safety Validation Test of AEBS Based on Fault Injection","authors":"Q. Kongjian, Zhang Tong, Guo Kuiyuan, Z. Hongwei, Wang Yu, Chen Haoxin","doi":"10.1109/ICISCAE51034.2020.9236817","DOIUrl":"https://doi.org/10.1109/ICISCAE51034.2020.9236817","url":null,"abstract":"In ISO 26262, the functional safety validation test of E / E system is required. Fault injection is a general method of functional safety validation test. AEBS is an important part of vehicle active safety, so it is very meaningful to study the fault injection test of AEBS. In this paper, a method of functional safety validation test of AEBS based on fault injection is studied, including the preparation, execution and passing standards of the test. This test method can be used to evaluate the effectiveness of the security mechanism and is suitable for functional security validation test.","PeriodicalId":355473,"journal":{"name":"2020 IEEE 3rd International Conference on Information Systems and Computer Aided Education (ICISCAE)","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124648740","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Similarity Calculation Model of Weak Link Web Pages Based on Keyword Location Influence","authors":"Peng Jiang, W. Zhou, Yu-lian Li","doi":"10.1109/ICISCAE51034.2020.9236843","DOIUrl":"https://doi.org/10.1109/ICISCAE51034.2020.9236843","url":null,"abstract":"Weakly linked web pages are a group of related pages with weak connections. With the advent of the self-media era, the related information links between various platforms have become weaker, the calculation of the similarity of weakly linked web pages is becoming more and more important. The current method for calculating the similarity of weakly linked webpages is to combine the similarity of webpage content and the relevance of links, and then simply add the results. There is a large deviation in the calculation results of this method. To this end, this paper proposes a similarity calculation model for weak link webpages based on the influence of keyword position (WIWKLI). First, we start with the division of web pages, through URL matching deduplication, keyword similarity calculation to form a keyword sequence of web pages, then through the improvement of the RNN model to calculate the positional influence of keywords, so as to realize the precise definition of the webpage and form a link pseudo-network between related webpages accordingly, Finally, the similarity between web pages is calculated through the pseudo-network. By applying this calculation model to the focused crawler experiment, Experimental results show that the method proposed in this paper can calculate the similarity of weakly linked web pages, and the accuracy and page relevance have been improved to a certain extent.","PeriodicalId":355473,"journal":{"name":"2020 IEEE 3rd International Conference on Information Systems and Computer Aided Education (ICISCAE)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129096040","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Automatic Generation Method of Basketball Continuous Pitching Action Based on Multi-Objective Machine Vision","authors":"Li Qiaomei, Xu Yi","doi":"10.1109/ICISCAE51034.2020.9236810","DOIUrl":"https://doi.org/10.1109/ICISCAE51034.2020.9236810","url":null,"abstract":"In order to improve the effectiveness of basketball continuous pitching motion guidance, the image characteristics of basketball continuous pitching motion are analyzed with image processing method, and an automatic generation method of basketball continuous pitching motion based on multi-objective machine vision is proposed. The method comprises the following steps of: establishing a shape feature point feature matching model of a basketball continuous pitching motion fuzzy image; extracting posture key action points of the basketball continuous pitching motion fuzzy image by combining a spectral feature detection method; carrying out adaptive enhancement processing on the basketball continuous pitching motion fuzzy image by adopting a shape feature segmentation method; and obtaining sub-band pixel feature points of the basketball continuous pitching motion fuzzy image by combining a point tracking matching method and a feature extraction method. The fuzzy image of basketball continuous pitching motion is enhanced to improve the expression ability of posture information of fuzzy noise points in the image. The significant contrast enhancement processing of the fuzzy image of basketball continuous pitching motion is carried out through the point tracking recognition method, and the multi-objective machine vision features of the fuzzy image of basketball continuous pitching motion are extracted to realize automatic generation and accurate recognition of the fuzzy image of basketball continuous pitching motion. The simulation results show that the output peak signal-to-noise ratio automatically generated by using this method for basketball continuous pitching motion is higher, and the image recognition ability is better. Therefore, it is necessary to improve the performance of the system.","PeriodicalId":355473,"journal":{"name":"2020 IEEE 3rd International Conference on Information Systems and Computer Aided Education (ICISCAE)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120845453","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Spatio-Temporal Context Tracking Method Blended with LBP Texture Feature","authors":"Guangshuai Liu, Xurui Li, Si Sun","doi":"10.1109/ICISCAE51034.2020.9236874","DOIUrl":"https://doi.org/10.1109/ICISCAE51034.2020.9236874","url":null,"abstract":"A spatio-temporal context (STC) tracking method blended with LBP texture feature is proposed with regard to the problem that it's hard to track a target effectively by a conventional STC tracking method where target background mutation, shading or shape change takes place during tracking. First, the similarity in the texture histogram of the target area between the first image frame and each image frame behind it is calculated to solve the problem of central position shift as a result of the background mutation of the tracked target. The similarity in the texture histogram of the target area between two adjacent frames is then calculated to solve the problem of shading that happens to the tracked target. Finally, a judgment is made as to whether or not the STC update coefficient is changed and the central position coordinates of the tracked target offset, based on the relation between the worked-out similarities in texture histogram and the threshold. Shape change does not alter local texture information about the tracked target and the STC tracking method blended with LBP textural feature has thus good robustness to shape change. Experimental results show that the method in this paper sees a 73.06% increase in average rate of successful tracking and an 89.94-pixel decrease in average error in target's central position, compared with the original STC tracking method. The method in this paper allows more stable tracking of a target where target background mutation, shading or shape change takes place.","PeriodicalId":355473,"journal":{"name":"2020 IEEE 3rd International Conference on Information Systems and Computer Aided Education (ICISCAE)","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114616166","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Li Yang, J. Ding, Liheng Jiang, Renrui Han, Yingchun Bi, Shangzhi Zheng
{"title":"A Novel Method for Leaf Recognition Based on D-LLE and Polar Coordinate Feature Extraction","authors":"Li Yang, J. Ding, Liheng Jiang, Renrui Han, Yingchun Bi, Shangzhi Zheng","doi":"10.1109/ICISCAE51034.2020.9236850","DOIUrl":"https://doi.org/10.1109/ICISCAE51034.2020.9236850","url":null,"abstract":"By extracting low-level features under the rectangular coordinate system, traditional leaf recognition methods typically have properties such as high dimensionality of extracted features, high-computational requirement and weak generalization performance. Based on the manifold learning algorithm D-LLE, we proposed a novel leaf recognition method under the polar coordinate system. The method first extracts from the leaf images high-dimensional features associated with polar coordinate as the preprocessing. Consequently, D-LLE is harnessed to reduce the features' dimensionality. In the low-dimensional space, we use the nearest neighbor classifier to make final determination. Experimental results exhibit higher effectiveness and efficiency of our method compared with classical traditional methods.","PeriodicalId":355473,"journal":{"name":"2020 IEEE 3rd International Conference on Information Systems and Computer Aided Education (ICISCAE)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127880736","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Hongyan Zhan, Xinyu Han, Kai Zhang, Longli Tang, Lijin Wu
{"title":"Design of Component Fault Recovery of Integrated Control System Based on Log Information","authors":"Hongyan Zhan, Xinyu Han, Kai Zhang, Longli Tang, Lijin Wu","doi":"10.1109/ICISCAE51034.2020.9236830","DOIUrl":"https://doi.org/10.1109/ICISCAE51034.2020.9236830","url":null,"abstract":"In view of the limitations of conventional fault recovery design technology applied to the fault recovery of integrated control system components, and for the purpose of improving the software fault tolerance, this paper proposes a design technology of integrated control system component fault recovery based on log information, which uses the log checkpoint information to recover system faulty component using the checkpoint backward recovery technology and the system log information. It relies on the log information to repeat the execution steps since the last checkpoint, so that the process of task execution is exactly the same as that before the fault, which keep the integrity of task execution. The experimental results show that the design technology of component fault recovery based on log information in an integrated control system in a certain field has better fault recovery, it improves system fault tolerance ability.","PeriodicalId":355473,"journal":{"name":"2020 IEEE 3rd International Conference on Information Systems and Computer Aided Education (ICISCAE)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128025989","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on Optimization of Customer Value Segmentation Based on Improved K-Means Clustering Algorithm","authors":"Xiaochuan Pu, Chang-xin Song, Junli Huang","doi":"10.1109/ICISCAE51034.2020.9236867","DOIUrl":"https://doi.org/10.1109/ICISCAE51034.2020.9236867","url":null,"abstract":"In order to solve the problem of customer value, telecom enterprises generally classified them into the RFM model index, according to telecom customer analysis on the lack of forward-looking, so put forward FTCA customer segmentation model, industry characteristics, reflect the value of customers at the same time fusion and applies the model index to improve the peak density clustering algorithm. Because the clustering algorithm clustering effect is associated with the choice of truncation distance, so this paper proposes an adaptive density peak algorithm based on gini coefficient. In this article, through clustering algorithm evaluation index analysis and visualization analysis experiment, the results show that the model and algorithm of the classification of customers are more effectively and fully reflect customer value.","PeriodicalId":355473,"journal":{"name":"2020 IEEE 3rd International Conference on Information Systems and Computer Aided Education (ICISCAE)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128077852","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}