2018 IEEE 3rd Advanced Information Technology, Electronic and Automation Control Conference (IAEAC)最新文献

筛选
英文 中文
Efficient Encoding of Quasi-Cyclic Low-Density Parity-Check Codes 拟循环低密度奇偶校验码的高效编码
Tingting Liang, Peng Zhang, Changyin Liu, Jin Liu
{"title":"Efficient Encoding of Quasi-Cyclic Low-Density Parity-Check Codes","authors":"Tingting Liang, Peng Zhang, Changyin Liu, Jin Liu","doi":"10.1109/IAEAC.2018.8577709","DOIUrl":"https://doi.org/10.1109/IAEAC.2018.8577709","url":null,"abstract":"A compact encoding process with three phases is proposed for quasi-cyclic low-density parity-check (QC-LDPC) codes. A back substitution circuit is shared at the first and third phases. A high-speed vector-dense-matrix multiplier is well designed for the second phase, which offers tradeoffs between speed and memory. The proposed encoding method just removes some nonzero circulants of a sparse parity-check matrix $pmb{H}$. while the classical Richardson-Urbanke (RU) approach splits $pmb{H}$ into multiple submatrices and destroys its integrity. It is shown that the proposed encoder runs fast, has low complexity, and is well compatible with multiple code rates.","PeriodicalId":6573,"journal":{"name":"2018 IEEE 3rd Advanced Information Technology, Electronic and Automation Control Conference (IAEAC)","volume":"48 1","pages":"1189-1193"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88715402","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 45
An Algorithm for Feature Extraction of Weld Groove based on Laser Vision 基于激光视觉的焊缝坡口特征提取算法
Dianyong Yu, Qiang Liao
{"title":"An Algorithm for Feature Extraction of Weld Groove based on Laser Vision","authors":"Dianyong Yu, Qiang Liao","doi":"10.1109/IAEAC.2018.8577682","DOIUrl":"https://doi.org/10.1109/IAEAC.2018.8577682","url":null,"abstract":"The extraction of weld groove geometry feature information is the premise of weld tracking technology. The existing seam feature information extraction technology has a good effect on thin plate, but its extraction accuracy is low when dealing with thick plate and deep weld groove. Based on the point scanning laser sensor, a method of image information preprocessing and feature extraction for thick plate is proposed, and the related algorithms are optimized. Aiming at the common right angle and oblique inflection point in the weld groove, the slope extreme value method and the oblique intercept method are used to extract the weld seam feature points respectively. Finally, the effectiveness of the proposed algorithm is verified by experiments.","PeriodicalId":6573,"journal":{"name":"2018 IEEE 3rd Advanced Information Technology, Electronic and Automation Control Conference (IAEAC)","volume":"9 1","pages":"1538-1542"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89366226","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Time-position mapping method for monitoring data and cutting position 监测数据和切割位置的时位映射方法
Weihong Xia, Dinghua Zhang, M. Luo, Ying Zhang
{"title":"Time-position mapping method for monitoring data and cutting position","authors":"Weihong Xia, Dinghua Zhang, M. Luo, Ying Zhang","doi":"10.1109/IAEAC.2018.8577600","DOIUrl":"https://doi.org/10.1109/IAEAC.2018.8577600","url":null,"abstract":"In numerical control machining, the production scene data is an important basis for studying processing technology and optimizing processing parameters, which can be collected, processed and analyzed in real time. However, processing data measured by extra equipment on the machine tool are all in time dimension, while cutting position parameters of the machine tool are in spatial dimension. Thus, there is no one-to-one correspondence between the monitoring data and cutting position, which is inconvenient to research various coupling relationships of the workpiece in machining process. This paper presents a time-position mapping method for the monitoring data and the cutting position, where data are collected by the acquisition device and the data acquisition software in the same frequency. Time zeroing at the marked position synchronizes the data acquisition processes in time dimension, which realizes the time-position mapping between the monitoring data and the cutting position. Based on Siemens 840D numerical system, linear and curvilinear motion milling experiments with different feed rates verify the accuracy of the collected data from the acquisition software. Boss with different heights cutting experiments show the correctness of the time-position mapping between the monitoring data and the cutting position.","PeriodicalId":6573,"journal":{"name":"2018 IEEE 3rd Advanced Information Technology, Electronic and Automation Control Conference (IAEAC)","volume":"24 1","pages":"1281-1287"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87031609","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Exploration of the Stress with a Width Crack on Semi-infinite Plane Boundary 半无限平面边界上宽度裂纹应力的探讨
C. Fu, X. Yang, Lei Wang
{"title":"The Exploration of the Stress with a Width Crack on Semi-infinite Plane Boundary","authors":"C. Fu, X. Yang, Lei Wang","doi":"10.1109/IAEAC.2018.8577837","DOIUrl":"https://doi.org/10.1109/IAEAC.2018.8577837","url":null,"abstract":"This paper discusses a static problem of elastic semi-infinite plane with a width crack. We put forward the boundary condition by the force analysis of the actual physical model, and establish the integral equation on the boundary crack L°, + L1 by using the D.I. Sherman method, which is based on the relevant elastic mechanics knowledge. Then by inverse transformation the original problem is reduced to the singular integral equations on crack L1, which is discreted by using the Gauss formula afterwards, to get the numerical solution of it. Finally, we use MATLAB to simulate the numerical solution to get the trend chart of the crack displacement, which is affected by external force and crack inclination angle. It intuitively shows the change rule of crack and all parameters.","PeriodicalId":6573,"journal":{"name":"2018 IEEE 3rd Advanced Information Technology, Electronic and Automation Control Conference (IAEAC)","volume":"65 1","pages":"2482-2486"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90725047","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Exploring Topological Graph Passwords of Information Security by Chinese Culture 中国文化对信息安全拓扑图密码的探索
Yarong Mu, B. Yao
{"title":"Exploring Topological Graph Passwords of Information Security by Chinese Culture","authors":"Yarong Mu, B. Yao","doi":"10.1109/IAEAC.2018.8577848","DOIUrl":"https://doi.org/10.1109/IAEAC.2018.8577848","url":null,"abstract":"Graphical passwords are used in the world. Several kinds of topological graphic passwords (Topsnut-GPWs) are designed by using disconnected topology graphs in this paper. Our methods for the construction of Topsnut-GPWs can be transformed into efficient algorithms, and the spaces of Topsnut-GPWs are large and complex for withstanding attacks. We show that the mathematical modulus (Hanzi-graphs) of Chinese characters for making new Topsnut-GPWs that may be easily accepted by Chinese people.","PeriodicalId":6573,"journal":{"name":"2018 IEEE 3rd Advanced Information Technology, Electronic and Automation Control Conference (IAEAC)","volume":"17 1","pages":"1648-1652"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90738502","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Research on Customer Attention of Online Short-term Rental Platform 在线短租平台客户关注度研究
Nan Meng, Xiaomin Xu
{"title":"Research on Customer Attention of Online Short-term Rental Platform","authors":"Nan Meng, Xiaomin Xu","doi":"10.1109/IAEAC.2018.8577613","DOIUrl":"https://doi.org/10.1109/IAEAC.2018.8577613","url":null,"abstract":"The online short-term rental platform is becoming the first choice for travel accommodation. The use of ROST content mining software to further analyze the concerns of tenants on the service quality of short rental sources by selecting the sample of tourist cities for the use of on-line commentary information for short rental housing users of domestic mainstream short-term rental platforms, and to obtain supporting facilities and housing Sources of comfort, traffic, surrounding environment, and landlord services focus on specific indicators. Finally, these indicators provide valuable business advice for short-term rental platforms and landlords. It aims to increase the satisfaction of short-term tenants and promote the development of the online short-term rental industry.","PeriodicalId":6573,"journal":{"name":"2018 IEEE 3rd Advanced Information Technology, Electronic and Automation Control Conference (IAEAC)","volume":"15 2 1","pages":"2455-2459"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91003551","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Situation Visualization System Based on 2D&3D Electronic Sand Table 基于2D&3D电子沙盘的态势可视化系统
Qin Li, Haimin Liu, Zhenyu Wu
{"title":"A Situation Visualization System Based on 2D&3D Electronic Sand Table","authors":"Qin Li, Haimin Liu, Zhenyu Wu","doi":"10.1109/IAEAC.2018.8577668","DOIUrl":"https://doi.org/10.1109/IAEAC.2018.8577668","url":null,"abstract":"The situation visualization had acted an important prop of judging the situation and determining the decision, in order to improve the ability of scene show and Human-Computer Interaction (HCI), a situation visualization system based on 2D&3D electronic sand table was proposed. Firstly, focusing on the linkage mode, the 2D&3D electronic sand table was designed with the three-tier structure. Then the general architecture of the situation visualization system was built, the basic flow was defined. Finally, software-hardware platform of the situation visualization was applied for the multi-commander consultation and decision-making. The result shows the application value of the system could be effective and significant.","PeriodicalId":6573,"journal":{"name":"2018 IEEE 3rd Advanced Information Technology, Electronic and Automation Control Conference (IAEAC)","volume":"9 1","pages":"2057-2060"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89783615","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Music personalized recommendation system based on improved KNN algorithm 基于改进KNN算法的音乐个性化推荐系统
Gang Li, Jingjing Zhang
{"title":"Music personalized recommendation system based on improved KNN algorithm","authors":"Gang Li, Jingjing Zhang","doi":"10.1109/IAEAC.2018.8577483","DOIUrl":"https://doi.org/10.1109/IAEAC.2018.8577483","url":null,"abstract":"The rapid development of the Internet has led to the emergence of massive amounts of music. In order to make people hear their favorite music more accurately, various recommendation algorithms emerge one after another. KNN is one of the best neighboring algorithms based on collaborative filtering. However, when the ratings that from the users' changed, the error rate of the KNN recommendation algorithm is higher. In this paper, we point the disadvantages of the KNN algorithm that is greatly affected by the rating. And then we propose the improved algorithm KNN-Improved which is based on the KNN algorithm and makes use of the mean value's thought of the Baseline algorithm, besides, we add to the standard deviation of the rating. These measures can effectively reduce the impact of too high or too low about user ratings, reduce the error rate of the recommendation algorithm, and then achieve better recommendation results. Finally, different recommendation algorithms are compared for performance and improved algorithms are applied.","PeriodicalId":6573,"journal":{"name":"2018 IEEE 3rd Advanced Information Technology, Electronic and Automation Control Conference (IAEAC)","volume":"23 1","pages":"777-781"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90832299","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Recognition Algorithm of Emitter Signals Based on PCA+CNN 基于PCA+CNN的发射信号识别算法
Wenqiang Ye, Cong Peng
{"title":"Recognition Algorithm of Emitter Signals Based on PCA+CNN","authors":"Wenqiang Ye, Cong Peng","doi":"10.1109/IAEAC.2018.8577538","DOIUrl":"https://doi.org/10.1109/IAEAC.2018.8577538","url":null,"abstract":"In order to solve the problem of low recognition rate of emitter signal under low SNR by the traditional method, a recognition algorithm based on PCA+CNN is proposed. The radar emitter signal is processed time-frequency image. The image is processed, and is reduced dimensionality by PCA. Learning model is adjusted by pretraining, and the softmax classifier commonly used on the pretraining model adopts supervised sizing and recognition, finally complete the identification task. The simulation results show that the algorithm can achieve high recognition rate, compared with traditional algorithm.","PeriodicalId":6573,"journal":{"name":"2018 IEEE 3rd Advanced Information Technology, Electronic and Automation Control Conference (IAEAC)","volume":"36 1","pages":"2410-2414"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89540371","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
On Space and Design of Topological Graphic Passwords For Information Networks 信息网络拓扑图形密码的空间与设计
B. Yao, Xiaohui Zhang, Yarong Mu, Hui Sun, Hongyu Wang, Mingjun Zhang, Sihua Yang
{"title":"On Space and Design of Topological Graphic Passwords For Information Networks","authors":"B. Yao, Xiaohui Zhang, Yarong Mu, Hui Sun, Hongyu Wang, Mingjun Zhang, Sihua Yang","doi":"10.1109/IAEAC.2018.8577571","DOIUrl":"https://doi.org/10.1109/IAEAC.2018.8577571","url":null,"abstract":"Graphical passwords are already used in a wide range of scientific areas, especially, dynamic networks. OR code is a successful example. We estimate the spaces of topological graphic passwords (Topsnut-GPWs) that can be use conveniently and have higher level security in information networks by mean of topological structures and colorings/labellings of graph theory. We show that a type of special trees, called caterpillars, can be used to design the Topsnut-GPWs, since caterpillars admit many graph labellings and deduce lobsters having some graph labellings. And we discuss harmonious labellings and provide a new type of harmonious labellings. We point that it is easy for converting Topsnut-GPWs into text-based passwords, but not in turn in general.","PeriodicalId":6573,"journal":{"name":"2018 IEEE 3rd Advanced Information Technology, Electronic and Automation Control Conference (IAEAC)","volume":"6 1","pages":"1653-1659"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89710879","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信