{"title":"Multi-domain feature extraction method of motor imagery EEG signal based on DWT and CSP","authors":"Ning Li, Yongze Liu","doi":"10.1117/12.2631559","DOIUrl":"https://doi.org/10.1117/12.2631559","url":null,"abstract":"Aiming at the feature extraction of motor imagery electroencephalogram (EEG) signals of four types, this paper proposes a new method combining discrete wavelet transformation (DWT) and common spatial patterns (CSP). First, DWT method is used to select the appropriate frequency band according to the frequency features of signals, and the energy mean of the selected frequency band signal is used as a time-frequency feature. Second, CSP method is proposed to solving double classification problem to solving recognition of four types signals problem and extract spatial features. Finally, fusion features are fed into the support vector machine (SVM) classifier and the classification accuracy reached 72.92%. The result is 6.95% better than using only the CSP method and 12.16% better than using only the DWT method, which verify the effectiveness of the proposed method.","PeriodicalId":415097,"journal":{"name":"International Conference on Signal Processing Systems","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122916198","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Security transmission technology for satellite communication based on integer domain chaotic system","authors":"Yijun Deng, Yuanxiang Chen, Jiahao Li, Chang Liu, Fan Lu, Bing Ma, Zhang Lu, Jingshuang Cheng, Jianguo Yu","doi":"10.1117/12.2631557","DOIUrl":"https://doi.org/10.1117/12.2631557","url":null,"abstract":"Ensuring information security is of great significance to a satellite communication system. In this paper, a chaotic encryption scheme is proposed for a satellite communication system. Firstly, five chaotic sequences are generated by a five-dimensional chaotic system. And then, XOR, scrambling and interpolation are performed on the data in turn. The simulation results show that the bit error rate of this method approaches 0 when the SNR is greater than 18, and the bit error rate of the illegal receiver is as high as 35.3% when the correct key is unknown. Therefore, secure communication can be achieved.","PeriodicalId":415097,"journal":{"name":"International Conference on Signal Processing Systems","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114451221","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on unmanned aerial vehicle application based on 5G communication technology","authors":"Tao Jia, Chuncheng Wei, Jing Tang","doi":"10.1117/12.2631465","DOIUrl":"https://doi.org/10.1117/12.2631465","url":null,"abstract":"With the development of UAV technology, because of its advantages of low cost, easy operation and high flexibility, UAV has been applied to many fields such as transportation, patrol inspection, live broadcasting and so on. However, due to the problems of low rate, high delay and poor interaction, the task execution efficiency of UAV is not very satisfactory. In recent years, the rapid rise of 5g technology has brought another opportunity to the field of UAV. This paper proposes the application of UAV Based on 5g communication technology, which overcomes the current bottleneck of UAV. It provides a solution for the field application of UAV, and promotes the development of UAV.","PeriodicalId":415097,"journal":{"name":"International Conference on Signal Processing Systems","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126784394","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Robust adaptive beamforming based on sampling covariance matrix reconstruction and steering vector estimation","authors":"Jiang Shao, Peng Li, Jingwei Hu, Dengbo Sun, Renhong Xie, Yibin Rui","doi":"10.1117/12.2631411","DOIUrl":"https://doi.org/10.1117/12.2631411","url":null,"abstract":"Traditional adaptive beamforming algorithms require high accuracy for steering vectors(SV), array models and desired signal(DS). However, the performance of the beamformer will seriously degrade when the DS is present in training snapshots. For the purpose of improving output performance of adaptive beamformer, a novel adaptive beamforming algorithm is proposed. This approach estimates the desired signal SV and reconstructs the sampling covariance matrix (CM) based on integrating over a undesired signal region. Furthermore, only a little prior knowledge is required, such as the approximate incident angle of the DS. The proposed algorithm remove not only the influence of the DS in the sampling covariance matrix, but also the effect of background noise perturbation, which is significantly improved compared with other methods. The results of data simulation experiments confirms that the beamformer has a excellent performance in output performance.","PeriodicalId":415097,"journal":{"name":"International Conference on Signal Processing Systems","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131391493","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Donglan Liu, Haotong Zhang, Yang Guo, Yingxian Chang, Yong Zhang, Xin Liu, L. Ma, Rui Wang
{"title":"Design and application of intelligent IoT full scene simulation detection system for energy internet","authors":"Donglan Liu, Haotong Zhang, Yang Guo, Yingxian Chang, Yong Zhang, Xin Liu, L. Ma, Rui Wang","doi":"10.1117/12.2631439","DOIUrl":"https://doi.org/10.1117/12.2631439","url":null,"abstract":"In the context of the strategic goal of building energy Internet, State Grid Corporation of China has established a crossdisciplinary joint construction and common Internet of Things management platform, which carries out standardized access and unified online control for equipment in transmission, power transformation, distribution and other fields. In order to improve the access debugging efficiency of the IoT management platform accessed by terminal devices, this paper designed a full-scene simulation detection system for the intelligent IoT system oriented to the energy Internet. By using the existing construction ideas of intelligent IoT system and following the complete architecture of \"cloud, tube, edge, terminal \", the construction method of the simulation and coordination platform of intelligent IoT system of \"information-physical coupling\" is realized. Advanced technologies such as micro-service and distribution are adopted to build a lightweight simulation test system. A small amount of server resources can be used to simulate and test whether the communication protocol of the side device supports the communication protocol requirements of the intelligent IoT management platform. The functions of reporting equipment data collection and issuing control commands are tested, so as to complete the simulation, verification and testing functions of the whole electric power industry chain intelligent IoT system covering both internal and external businesses, and provide technical support for the construction and promotion of the IoT management platform of State Grid Corporation of China. Combined with the whole scene simulation and detection system of the intelligent Internet of Things system, the operating state sensing monitoring scene of the power distribution area is built to verify the functions of data reporting of the fusion terminal and command issuing of the simulation and detection system.","PeriodicalId":415097,"journal":{"name":"International Conference on Signal Processing Systems","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130919872","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Video methods for gait analysis in daily environment","authors":"P. Zhang, Yang Zhang","doi":"10.1117/12.2631593","DOIUrl":"https://doi.org/10.1117/12.2631593","url":null,"abstract":"Gait is one of important features to assess elderly physical condition which is directly relative to health status. The changes or abnormalities in gait may reflect risks in health. Different kinds of gait analysis methods have been proposed, such as pressure sensors based method and wearable equipment based method. Recently, with the development of computer vision technologies, more automatic, effective and non-intrusive ways are demanded to measure gait at either nursing facility or at-home in daily environment. In this paper, we propose an automatic approach for non-cooperative persons for gait analysis using 3D camera. This approach applies a tracking based recognition method to identify the targets on captured videos. Then 3D skeleton based behavior analysis is performed to select skeleton series of walking from daily behaviors. Finally gait characteristics are defined and calculated on selected skeleton series of each identified person for gait ability evaluation. Evaluations have been performed on a real-world environment where people do not stop in front of the camera. The result shows that the accuracy of recognition and behavior analysis method reaches above 90% for multiple persons, which is better efficiency and comparable accuracy than the previous methods and our approach is suitable for gait analysis in daily environment.","PeriodicalId":415097,"journal":{"name":"International Conference on Signal Processing Systems","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117161005","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
C. Chousangsuntorn, T. Tongloy, S. Chuwongin, S. Boonsang
{"title":"Three-stage deep learning system for recognizing contaminated serial numbers in hard disk drive: a comparison study with two-stage deep learning model","authors":"C. Chousangsuntorn, T. Tongloy, S. Chuwongin, S. Boonsang","doi":"10.1117/12.2631377","DOIUrl":"https://doi.org/10.1117/12.2631377","url":null,"abstract":"The previous two-stage deep learning model for detecting and classifying misidentified serial numbers on the defect hard disk drive (HDD) slider was proposed by authors. We found that the threshold level adjusted during preprocessing process could limit the robustness of the two-stage model in large-scale manufacturing. Thus, we proposed a three-stage deep learning model comprised of 1) region of interest (ROI) detection and cropping, 2) character detection and cropping, and 3) character classification. Object detection algorithm and classification network used in this model are based on YOLO v.4 and EfficientNet-B0. The 1000 images captured by the digital camera were used for training (600 images) and validation (400 images) of the ROI detection model. The other 1000 captured images were used for testing the performance of the proposed three-stage model, then we compared them with those obtained from the previous two-stage model. The proposed three-stage model reaches F1 score = 0.997 and recovery rate up to 95.9%, while the two-stage model yields only 0.948 and 73%, respectively.","PeriodicalId":415097,"journal":{"name":"International Conference on Signal Processing Systems","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130623290","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Bidirectional multi-lane vehicle counting approach based on trajectory features using MIMO radar","authors":"Liquan Tan, Zhaocheng Yang","doi":"10.1117/12.2631434","DOIUrl":"https://doi.org/10.1117/12.2631434","url":null,"abstract":"Due to the excellent performance of radar sensors in terrible environments, the potential application of radar in intelligent transportation has become a research hotspot. This paper proposes an approach to estimate the number of vehicles in bidirectional and multi-lane using MIMO radar. The radar is installed at the top of the overpass to track the vehicles. The core idea of the proposed approach is using the vehicles' trajectories to realize vehicle counting and adjusting the overtaking and lane changing situations. In the proposed approach, we first propose a method to avoid missing target detection. To improve the accuracy of vehicle tracking, we exploit the doppler information in the trajectory association. Finally, in order to eliminate the false alarm, we use the continuity and length features of trajectory in the vehicle counting process. Experiment results show that the proposed approach can achieve an average vehicle counting more than 95%.","PeriodicalId":415097,"journal":{"name":"International Conference on Signal Processing Systems","volume":"12171 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129089097","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Hong Wang, Jun Wang, Wenqing Wang, D. Zhang, Shuo Wang
{"title":"Microphysical characteristics of a precipitation affected by cold vortex based on disdrometer","authors":"Hong Wang, Jun Wang, Wenqing Wang, D. Zhang, Shuo Wang","doi":"10.1117/12.2631587","DOIUrl":"https://doi.org/10.1117/12.2631587","url":null,"abstract":"As a remote sensing instrument of rain drop size distribution, Parsivel disdrometer is widely deployed to meteorological observation stations. The microphysical characteristics of a severe precipitation affected by cold vortex are analyzed in this paper with the help of Parsivel disdrometer. After quality control of raw datasets, the precipitation process is classified as stratiform and convective precipitation. It is showed that convective precipitation has much larger values of liquid water content, rain rate and radar reflectivity factor than stratiform precipitation.","PeriodicalId":415097,"journal":{"name":"International Conference on Signal Processing Systems","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124480372","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Donglan Liu, Haotong Zhang, Yang Guo, Yingxian Chang, Yong Zhang, Fa-quan Zhang, Xin Liu, L. Ma
{"title":"Design and implementation of power Internet of Things device security detection system","authors":"Donglan Liu, Haotong Zhang, Yang Guo, Yingxian Chang, Yong Zhang, Fa-quan Zhang, Xin Liu, L. Ma","doi":"10.1117/12.2631451","DOIUrl":"https://doi.org/10.1117/12.2631451","url":null,"abstract":"Power Internet of Things (IoT) devices are increasingly being used in power systems. Due to the variety and complexity of devices, there is no mature solution for security detection. In order to solve this situation, this paper proposes a power Internet of Things device security detection system. Based on key technologies such as device fingerprint identification, network protocol identification and firmware security analysis, comprehensive security analysis is conducted on power Internet of Things devices from the perspectives of vulnerability, configuration security and firmware security. The automatic system design greatly improves the efficiency of users to carry out the detection work. Through the design and implementation of power Internet of Things equipment security detection system, users can quickly and efficiently carry out network access security detection of power Internet of Things equipment. Based on this, it is decided whether to allow the Internet of things devices or systems to access the power system network, avoiding security risks and hidden dangers caused by the Internet of things devices entering the network.","PeriodicalId":415097,"journal":{"name":"International Conference on Signal Processing Systems","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125881728","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}