2017 First International Conference on Electronics Instrumentation & Information Systems (EIIS)最新文献

筛选
英文 中文
Specific two words lexical semantic recognition based on the wavelet transform of narrowband spectrogram 基于窄带谱图小波变换的具体二词词汇语义识别
Ling Zhang, Ying Wei, Shuangwei Wang, Di Pan, Shili Liang, Tingfa Xu
{"title":"Specific two words lexical semantic recognition based on the wavelet transform of narrowband spectrogram","authors":"Ling Zhang, Ying Wei, Shuangwei Wang, Di Pan, Shili Liang, Tingfa Xu","doi":"10.1109/EIIS.2017.8298735","DOIUrl":"https://doi.org/10.1109/EIIS.2017.8298735","url":null,"abstract":"This paper presents a method based on wavelet transform of the narrowband spectrogram for specific two words Chinese lexical recognition. In the process of image feature extraction, the image processing technique is applied to the speech recognition field. Firstly, two-dimensional discrete db4 wavelet is used to decompose the narrowband spectrogram, which is divided into 6 layers of wavelet package decomposition, and calculates the approximate energy value. Then, the extracted approximate energy value is divided into level detail energy value, vertical detail energy and diagonal detail energy value, sets respectively as the narrowband spectrogram of the first characteristic set, the second and third feature set. The above three feature sets are used as feature vectors to support vector machine as a classifier for the overall recognition of two words Chinese vocabulary. 1000 voice samples are used in the simulation experiment. The results show that this method correct recognition rate can reach 96 percent.","PeriodicalId":434246,"journal":{"name":"2017 First International Conference on Electronics Instrumentation & Information Systems (EIIS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125367021","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
An effective method for human detection using far-infrared images 一种利用远红外图像进行人体检测的有效方法
Dianyuan Wu, Jihong Wang, W. Liu, Jianzhong Cao, Zuofeng Zhou
{"title":"An effective method for human detection using far-infrared images","authors":"Dianyuan Wu, Jihong Wang, W. Liu, Jianzhong Cao, Zuofeng Zhou","doi":"10.1109/EIIS.2017.8298602","DOIUrl":"https://doi.org/10.1109/EIIS.2017.8298602","url":null,"abstract":"In this paper, a robust real-time approach to detect humans in far-infrared images is proposed. Adaptive thresholds and vertical edge operator are combined to extract human candidate regions. Then, disturbing components are removed using morphological operations, size filtering and component labeling. After analyzing each connected region through histogram evaluation, local thresholds are employed to separate overlapped human candidates into single ones. At last, nonhuman objects are eliminated by shape refinement. Experimental results demonstrate the approach is accurate to locate human regions and efficient to meet the real-time demand of a general surveillance system.","PeriodicalId":434246,"journal":{"name":"2017 First International Conference on Electronics Instrumentation & Information Systems (EIIS)","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125566745","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Jamming strategy and security performance analysis for the cooperative system with untrusted relay 非可信中继协同系统的干扰策略及安全性能分析
Qian Zhou, G. Zang, Yuanyuan Gao, Huiying Song
{"title":"Jamming strategy and security performance analysis for the cooperative system with untrusted relay","authors":"Qian Zhou, G. Zang, Yuanyuan Gao, Huiying Song","doi":"10.1109/EIIS.2017.8298647","DOIUrl":"https://doi.org/10.1109/EIIS.2017.8298647","url":null,"abstract":"In this paper, we investigate the cooperative jamming (CJ) strategy in a three-node cooperative system, where the relay, which forwards the received signals in a amplify-and-forward (AF) protocol, is untrusted, furthermore, there is an external malicious eavesdropper. A two-phase CJ scheme, which merely using internal nodes of the cooperative system without the help of external nodes, is proposed to enhance the secrecy information transmission against the malicious eavesdropper and the untrusted relay. And then, we provide the optimal power allocation with maximum instantaneous secrecy rate (OPA-MISR) and the suboptimal power allocation with max-min instantaneous secrecy rate (SPA-MMISR). Finally, the simulation results show that the cooperative jamming proposed is effective to improve the achievable instantaneous secrecy rate and to resist both internal untrusted relay and external malicious eavesdropper.","PeriodicalId":434246,"journal":{"name":"2017 First International Conference on Electronics Instrumentation & Information Systems (EIIS)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126844351","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Research on the influence of urban metro traction power supply system on power grid harmonics 城市地铁牵引供电系统对电网谐波的影响研究
Han Aoyang, Yu Litao, Wang Li, Jia Xu, Sun Wenhui, Bi Yunfan
{"title":"Research on the influence of urban metro traction power supply system on power grid harmonics","authors":"Han Aoyang, Yu Litao, Wang Li, Jia Xu, Sun Wenhui, Bi Yunfan","doi":"10.1109/EIIS.2017.8298567","DOIUrl":"https://doi.org/10.1109/EIIS.2017.8298567","url":null,"abstract":"Urban rail traffic is an ideal transportation in modern city, which also can satisfy the travel demand of citizens. With the expanding scale of urban rail traffic, the harmonic influence which produced by urban rail traffic accessing to the power grid draws more and more attention. The waveform distortion in metro power supply system is derived from rectifier and inverter unit, DC power supply and other electronic devices in vehicle traction power supply system. This paper mainly studies the harmonic problems caused by the traction power supply system, carries on the simulation by using MATLAB and puts forward some effective measures.","PeriodicalId":434246,"journal":{"name":"2017 First International Conference on Electronics Instrumentation & Information Systems (EIIS)","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121293971","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Risk communication and simulation of supply chain 供应链风险沟通与模拟
Jijiao Jiang, Chang Liu, Heng-zhen Huang, Hongying Zhang
{"title":"Risk communication and simulation of supply chain","authors":"Jijiao Jiang, Chang Liu, Heng-zhen Huang, Hongying Zhang","doi":"10.1109/EIIS.2017.8298671","DOIUrl":"https://doi.org/10.1109/EIIS.2017.8298671","url":null,"abstract":"Based on the idea of virus transmission the paper constructs the risk model of Supply Chain, and then set the threshold of natural disasters rate, disease rate, cure rate, infection rate and the cooperation among the supply chain enterprises. The paper use Matlab to simulate the transmission model. The research shows that the number of cooperative relations between supply chain enterprises is determined by the number of core enterprises of the industry in a relatively stable industry background. In addition the infection rate, cure rate and infection rate have a certain relationship with the number of supply chain cooperation. According to the structure of simulation, this paper puts forward some management suggestions that the risk and credit risk of core enterprise in supply chain should be paid more attention, the supply chain core enterprise certification qualification should be examined strictly, the formation of Supply Chain Partnership should be encouraged.","PeriodicalId":434246,"journal":{"name":"2017 First International Conference on Electronics Instrumentation & Information Systems (EIIS)","volume":"5 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114122757","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Research on the defects identify of the weld-line's image of the in-service pipeline based on BP neural network 基于BP神经网络的在役管道焊缝图像缺陷识别研究
Yin Jian, Gao Yuan
{"title":"Research on the defects identify of the weld-line's image of the in-service pipeline based on BP neural network","authors":"Yin Jian, Gao Yuan","doi":"10.1109/EIIS.2017.8298623","DOIUrl":"https://doi.org/10.1109/EIIS.2017.8298623","url":null,"abstract":"This paper applied computer aided technique to do the image recognition work of the welding-line's defects. And this paper uses aspect ratio, roundness, compactness, symmetry, steepness, gray contrast of defect and the background, position of the defect as the defects' eigenvalues. And this paper applied BP neural network to recognize the defects. And experiments are used to get the best values of the eigenvalues.","PeriodicalId":434246,"journal":{"name":"2017 First International Conference on Electronics Instrumentation & Information Systems (EIIS)","volume":"93 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121122471","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A method of determining route safety based on graphical logic AND operation 一种基于图形逻辑与运算的路线安全判定方法
Yang Huadong, Cao Liang
{"title":"A method of determining route safety based on graphical logic AND operation","authors":"Yang Huadong, Cao Liang","doi":"10.1109/eiis.2017.8298676","DOIUrl":"https://doi.org/10.1109/eiis.2017.8298676","url":null,"abstract":"With the increase of geographic information capacity, the calculation of flight path planning will increase rapidly. In this paper, we propose a method to determine the positional relationship between obstacle and flight path using graphical logic AND algorithms. By drawing the obstacle information map and the aircraft route map under the same reference, the intersection of geographic information and spatial region judgment is transformed into computer graphics logic AND operations, so that the real-time judgment of the safety of flight path is realized, the computation time does not increase significantly with the increase of geographic information, a large number of route planning operations can be completed in a shorter time with a lower computational resource configuration.","PeriodicalId":434246,"journal":{"name":"2017 First International Conference on Electronics Instrumentation & Information Systems (EIIS)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116082841","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on large capacity data acquisition and storage system based on metro monitoring 基于城域监控的大容量数据采集与存储系统研究
Funian Li, Xi-Qiang Zeng, Yongyi Yan
{"title":"Research on large capacity data acquisition and storage system based on metro monitoring","authors":"Funian Li, Xi-Qiang Zeng, Yongyi Yan","doi":"10.1109/EIIS.2017.8298744","DOIUrl":"https://doi.org/10.1109/EIIS.2017.8298744","url":null,"abstract":"Real time monitoring of subway tunnel can prevent major structural safety accidents, and it is of great significance to take measures to maintain the structure and prolong the service life of the structure. First, we introduce the framework of the metro monitoring system based on mobile terminal. According to the real-time data display needs, real-time data acquisition module using the application programming interface was developed. Second, the structure of hierarchical storage table was proposed, which can better solve the problem of the efficiency of huge data retrieval and storage, and it provides the feasible scheme for subway tunnel monitoring system.","PeriodicalId":434246,"journal":{"name":"2017 First International Conference on Electronics Instrumentation & Information Systems (EIIS)","volume":"115 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123837476","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Resource allocation strategy in SCMA based multiple access system 基于SCMA的多址系统资源分配策略
Wang Liqiang, Liu Xinyue, Guo Shan, Han Xingling
{"title":"Resource allocation strategy in SCMA based multiple access system","authors":"Wang Liqiang, Liu Xinyue, Guo Shan, Han Xingling","doi":"10.1109/EIIS.2017.8298674","DOIUrl":"https://doi.org/10.1109/EIIS.2017.8298674","url":null,"abstract":"The fifth generation (5G) communication system is expected to support various applications and devices. Sparse code multiple access (SCMA) is a competent non-orthogonal multiple access technology for 5G wireless communication networks which can accommodate heavy connections with different user requirement for different applications. In addition, people's requirement on wireless communications of high quality, large data rate and functional diversification has grown swiftly in the last few years. Aiming to achieve high speed packet data transmission in scarce spectrum resource and maximize system throughput under the QoS (Quality of Service) constraint, appropriate resource allocation strategy is extremely needed. In this paper, a SCMA based downlink resource allocation strategy is designed and two radio resource allocation algorithms are applied into the novel strategy, namely, PF (Proportional Fair) algorithm and M-LWDF (Modified Largest Weighted Delay First) algorithm. Simulation results show that compared with OFDM based resource allocation strategy, the SCMA based resource allocation strategy can improve system throughput, reduce packet loss rate and latency, and user fairness can also be guaranteed.","PeriodicalId":434246,"journal":{"name":"2017 First International Conference on Electronics Instrumentation & Information Systems (EIIS)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125219737","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Non-stationary source separation and system identification for MIMO-AR mixtures using HM-GMM 基于HM-GMM的MIMO-AR混合物非平稳源分离与系统辨识
Jiong Li, Hang Zhang, Menglan Fan
{"title":"Non-stationary source separation and system identification for MIMO-AR mixtures using HM-GMM","authors":"Jiong Li, Hang Zhang, Menglan Fan","doi":"10.1109/EIIS.2017.8298650","DOIUrl":"https://doi.org/10.1109/EIIS.2017.8298650","url":null,"abstract":"A technique for non-stationary source separation is proposed for multiple-input multiple-output auto-regressive (MIMO-AR) mixtures. Hidden Markov Gaussian mixture model (HM-GMM) is employed in this paper to represent source model. Expectation-maximum algorithm is used to achieve MIMO-AR model identification, and then blind source separation (BSS) is achieved by matrix joint diagonalization. Simulation results show its effectiveness, not only for system identification, but also for BSS.","PeriodicalId":434246,"journal":{"name":"2017 First International Conference on Electronics Instrumentation & Information Systems (EIIS)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133084330","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信