{"title":"Specific two words lexical semantic recognition based on the wavelet transform of narrowband spectrogram","authors":"Ling Zhang, Ying Wei, Shuangwei Wang, Di Pan, Shili Liang, Tingfa Xu","doi":"10.1109/EIIS.2017.8298735","DOIUrl":"https://doi.org/10.1109/EIIS.2017.8298735","url":null,"abstract":"This paper presents a method based on wavelet transform of the narrowband spectrogram for specific two words Chinese lexical recognition. In the process of image feature extraction, the image processing technique is applied to the speech recognition field. Firstly, two-dimensional discrete db4 wavelet is used to decompose the narrowband spectrogram, which is divided into 6 layers of wavelet package decomposition, and calculates the approximate energy value. Then, the extracted approximate energy value is divided into level detail energy value, vertical detail energy and diagonal detail energy value, sets respectively as the narrowband spectrogram of the first characteristic set, the second and third feature set. The above three feature sets are used as feature vectors to support vector machine as a classifier for the overall recognition of two words Chinese vocabulary. 1000 voice samples are used in the simulation experiment. The results show that this method correct recognition rate can reach 96 percent.","PeriodicalId":434246,"journal":{"name":"2017 First International Conference on Electronics Instrumentation & Information Systems (EIIS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125367021","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Dianyuan Wu, Jihong Wang, W. Liu, Jianzhong Cao, Zuofeng Zhou
{"title":"An effective method for human detection using far-infrared images","authors":"Dianyuan Wu, Jihong Wang, W. Liu, Jianzhong Cao, Zuofeng Zhou","doi":"10.1109/EIIS.2017.8298602","DOIUrl":"https://doi.org/10.1109/EIIS.2017.8298602","url":null,"abstract":"In this paper, a robust real-time approach to detect humans in far-infrared images is proposed. Adaptive thresholds and vertical edge operator are combined to extract human candidate regions. Then, disturbing components are removed using morphological operations, size filtering and component labeling. After analyzing each connected region through histogram evaluation, local thresholds are employed to separate overlapped human candidates into single ones. At last, nonhuman objects are eliminated by shape refinement. Experimental results demonstrate the approach is accurate to locate human regions and efficient to meet the real-time demand of a general surveillance system.","PeriodicalId":434246,"journal":{"name":"2017 First International Conference on Electronics Instrumentation & Information Systems (EIIS)","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125566745","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Jamming strategy and security performance analysis for the cooperative system with untrusted relay","authors":"Qian Zhou, G. Zang, Yuanyuan Gao, Huiying Song","doi":"10.1109/EIIS.2017.8298647","DOIUrl":"https://doi.org/10.1109/EIIS.2017.8298647","url":null,"abstract":"In this paper, we investigate the cooperative jamming (CJ) strategy in a three-node cooperative system, where the relay, which forwards the received signals in a amplify-and-forward (AF) protocol, is untrusted, furthermore, there is an external malicious eavesdropper. A two-phase CJ scheme, which merely using internal nodes of the cooperative system without the help of external nodes, is proposed to enhance the secrecy information transmission against the malicious eavesdropper and the untrusted relay. And then, we provide the optimal power allocation with maximum instantaneous secrecy rate (OPA-MISR) and the suboptimal power allocation with max-min instantaneous secrecy rate (SPA-MMISR). Finally, the simulation results show that the cooperative jamming proposed is effective to improve the achievable instantaneous secrecy rate and to resist both internal untrusted relay and external malicious eavesdropper.","PeriodicalId":434246,"journal":{"name":"2017 First International Conference on Electronics Instrumentation & Information Systems (EIIS)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126844351","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Han Aoyang, Yu Litao, Wang Li, Jia Xu, Sun Wenhui, Bi Yunfan
{"title":"Research on the influence of urban metro traction power supply system on power grid harmonics","authors":"Han Aoyang, Yu Litao, Wang Li, Jia Xu, Sun Wenhui, Bi Yunfan","doi":"10.1109/EIIS.2017.8298567","DOIUrl":"https://doi.org/10.1109/EIIS.2017.8298567","url":null,"abstract":"Urban rail traffic is an ideal transportation in modern city, which also can satisfy the travel demand of citizens. With the expanding scale of urban rail traffic, the harmonic influence which produced by urban rail traffic accessing to the power grid draws more and more attention. The waveform distortion in metro power supply system is derived from rectifier and inverter unit, DC power supply and other electronic devices in vehicle traction power supply system. This paper mainly studies the harmonic problems caused by the traction power supply system, carries on the simulation by using MATLAB and puts forward some effective measures.","PeriodicalId":434246,"journal":{"name":"2017 First International Conference on Electronics Instrumentation & Information Systems (EIIS)","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121293971","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Risk communication and simulation of supply chain","authors":"Jijiao Jiang, Chang Liu, Heng-zhen Huang, Hongying Zhang","doi":"10.1109/EIIS.2017.8298671","DOIUrl":"https://doi.org/10.1109/EIIS.2017.8298671","url":null,"abstract":"Based on the idea of virus transmission the paper constructs the risk model of Supply Chain, and then set the threshold of natural disasters rate, disease rate, cure rate, infection rate and the cooperation among the supply chain enterprises. The paper use Matlab to simulate the transmission model. The research shows that the number of cooperative relations between supply chain enterprises is determined by the number of core enterprises of the industry in a relatively stable industry background. In addition the infection rate, cure rate and infection rate have a certain relationship with the number of supply chain cooperation. According to the structure of simulation, this paper puts forward some management suggestions that the risk and credit risk of core enterprise in supply chain should be paid more attention, the supply chain core enterprise certification qualification should be examined strictly, the formation of Supply Chain Partnership should be encouraged.","PeriodicalId":434246,"journal":{"name":"2017 First International Conference on Electronics Instrumentation & Information Systems (EIIS)","volume":"5 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114122757","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on the defects identify of the weld-line's image of the in-service pipeline based on BP neural network","authors":"Yin Jian, Gao Yuan","doi":"10.1109/EIIS.2017.8298623","DOIUrl":"https://doi.org/10.1109/EIIS.2017.8298623","url":null,"abstract":"This paper applied computer aided technique to do the image recognition work of the welding-line's defects. And this paper uses aspect ratio, roundness, compactness, symmetry, steepness, gray contrast of defect and the background, position of the defect as the defects' eigenvalues. And this paper applied BP neural network to recognize the defects. And experiments are used to get the best values of the eigenvalues.","PeriodicalId":434246,"journal":{"name":"2017 First International Conference on Electronics Instrumentation & Information Systems (EIIS)","volume":"93 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121122471","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A method of determining route safety based on graphical logic AND operation","authors":"Yang Huadong, Cao Liang","doi":"10.1109/eiis.2017.8298676","DOIUrl":"https://doi.org/10.1109/eiis.2017.8298676","url":null,"abstract":"With the increase of geographic information capacity, the calculation of flight path planning will increase rapidly. In this paper, we propose a method to determine the positional relationship between obstacle and flight path using graphical logic AND algorithms. By drawing the obstacle information map and the aircraft route map under the same reference, the intersection of geographic information and spatial region judgment is transformed into computer graphics logic AND operations, so that the real-time judgment of the safety of flight path is realized, the computation time does not increase significantly with the increase of geographic information, a large number of route planning operations can be completed in a shorter time with a lower computational resource configuration.","PeriodicalId":434246,"journal":{"name":"2017 First International Conference on Electronics Instrumentation & Information Systems (EIIS)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116082841","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on large capacity data acquisition and storage system based on metro monitoring","authors":"Funian Li, Xi-Qiang Zeng, Yongyi Yan","doi":"10.1109/EIIS.2017.8298744","DOIUrl":"https://doi.org/10.1109/EIIS.2017.8298744","url":null,"abstract":"Real time monitoring of subway tunnel can prevent major structural safety accidents, and it is of great significance to take measures to maintain the structure and prolong the service life of the structure. First, we introduce the framework of the metro monitoring system based on mobile terminal. According to the real-time data display needs, real-time data acquisition module using the application programming interface was developed. Second, the structure of hierarchical storage table was proposed, which can better solve the problem of the efficiency of huge data retrieval and storage, and it provides the feasible scheme for subway tunnel monitoring system.","PeriodicalId":434246,"journal":{"name":"2017 First International Conference on Electronics Instrumentation & Information Systems (EIIS)","volume":"115 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123837476","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Resource allocation strategy in SCMA based multiple access system","authors":"Wang Liqiang, Liu Xinyue, Guo Shan, Han Xingling","doi":"10.1109/EIIS.2017.8298674","DOIUrl":"https://doi.org/10.1109/EIIS.2017.8298674","url":null,"abstract":"The fifth generation (5G) communication system is expected to support various applications and devices. Sparse code multiple access (SCMA) is a competent non-orthogonal multiple access technology for 5G wireless communication networks which can accommodate heavy connections with different user requirement for different applications. In addition, people's requirement on wireless communications of high quality, large data rate and functional diversification has grown swiftly in the last few years. Aiming to achieve high speed packet data transmission in scarce spectrum resource and maximize system throughput under the QoS (Quality of Service) constraint, appropriate resource allocation strategy is extremely needed. In this paper, a SCMA based downlink resource allocation strategy is designed and two radio resource allocation algorithms are applied into the novel strategy, namely, PF (Proportional Fair) algorithm and M-LWDF (Modified Largest Weighted Delay First) algorithm. Simulation results show that compared with OFDM based resource allocation strategy, the SCMA based resource allocation strategy can improve system throughput, reduce packet loss rate and latency, and user fairness can also be guaranteed.","PeriodicalId":434246,"journal":{"name":"2017 First International Conference on Electronics Instrumentation & Information Systems (EIIS)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125219737","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Non-stationary source separation and system identification for MIMO-AR mixtures using HM-GMM","authors":"Jiong Li, Hang Zhang, Menglan Fan","doi":"10.1109/EIIS.2017.8298650","DOIUrl":"https://doi.org/10.1109/EIIS.2017.8298650","url":null,"abstract":"A technique for non-stationary source separation is proposed for multiple-input multiple-output auto-regressive (MIMO-AR) mixtures. Hidden Markov Gaussian mixture model (HM-GMM) is employed in this paper to represent source model. Expectation-maximum algorithm is used to achieve MIMO-AR model identification, and then blind source separation (BSS) is achieved by matrix joint diagonalization. Simulation results show its effectiveness, not only for system identification, but also for BSS.","PeriodicalId":434246,"journal":{"name":"2017 First International Conference on Electronics Instrumentation & Information Systems (EIIS)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133084330","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}