Pub Date : 2020-06-01DOI: 10.1109/ICAICA50127.2020.9181877
Hong Xinyu
Multilevel inverter has the ability to make up for the shortcomings of traditional two-level inverter, such as high switching loss, low inverter efficiency and EMI(Electro Magnetic Interference) influence, which are caused by its own topology defects. In this paper, the topological structure, steady state working process and advantages and disadvantages of the three main multilevel inverters based on asynchronous motor are analyzed and compared. The pulse width modulation method for multilevel inverter controlled by asynchronous motor is described. The future development trend of multilevel inverter is prospected.
{"title":"Review of Research on Multilevel Inverter Based on Asynchronous Motor","authors":"Hong Xinyu","doi":"10.1109/ICAICA50127.2020.9181877","DOIUrl":"https://doi.org/10.1109/ICAICA50127.2020.9181877","url":null,"abstract":"Multilevel inverter has the ability to make up for the shortcomings of traditional two-level inverter, such as high switching loss, low inverter efficiency and EMI(Electro Magnetic Interference) influence, which are caused by its own topology defects. In this paper, the topological structure, steady state working process and advantages and disadvantages of the three main multilevel inverters based on asynchronous motor are analyzed and compared. The pulse width modulation method for multilevel inverter controlled by asynchronous motor is described. The future development trend of multilevel inverter is prospected.","PeriodicalId":113564,"journal":{"name":"2020 IEEE International Conference on Artificial Intelligence and Computer Applications (ICAICA)","volume":"155 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113987918","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-06-01DOI: 10.1109/ICAICA50127.2020.9181875
Ling Cao, Zheyi Wan
The blockchain's cross-chain atomic exchange uses smart contracts to replace trusted third parties, but atomic exchange cannot guarantee the anonymity of transactions, and it will inevitably increase the risk of privacy leakage. Therefore, this paper proposes an atom based on zero-knowledge proof. Improved methods of exchange to ensure the privacy of both parties in a transaction. The anonymous improvement scheme in this article uses the UTXO unconsumed model to add a new anonymous list in the blockchain. When sending assets to smart contracts, zero-knowledge proof is used to provide self-certification of ownership of the asset, and then the transaction is broken down. Only the hash value of the transaction is sent to the node, and the discarded list is used to verify the validity of the transaction, which achieves the effect of storing assets anonymously in the smart contract. At the same time, a smart contract is added when the two parties in the transaction communicate to exchange the contract address of the newly set smart contract between the two parties in the transaction. This can prevent the smart contract address information from being stolen when the two parties in the transaction communicate directly.
{"title":"Anonymous scheme for blockchain atomic swap based on zero-knowledge proof","authors":"Ling Cao, Zheyi Wan","doi":"10.1109/ICAICA50127.2020.9181875","DOIUrl":"https://doi.org/10.1109/ICAICA50127.2020.9181875","url":null,"abstract":"The blockchain's cross-chain atomic exchange uses smart contracts to replace trusted third parties, but atomic exchange cannot guarantee the anonymity of transactions, and it will inevitably increase the risk of privacy leakage. Therefore, this paper proposes an atom based on zero-knowledge proof. Improved methods of exchange to ensure the privacy of both parties in a transaction. The anonymous improvement scheme in this article uses the UTXO unconsumed model to add a new anonymous list in the blockchain. When sending assets to smart contracts, zero-knowledge proof is used to provide self-certification of ownership of the asset, and then the transaction is broken down. Only the hash value of the transaction is sent to the node, and the discarded list is used to verify the validity of the transaction, which achieves the effect of storing assets anonymously in the smart contract. At the same time, a smart contract is added when the two parties in the transaction communicate to exchange the contract address of the newly set smart contract between the two parties in the transaction. This can prevent the smart contract address information from being stolen when the two parties in the transaction communicate directly.","PeriodicalId":113564,"journal":{"name":"2020 IEEE International Conference on Artificial Intelligence and Computer Applications (ICAICA)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114775646","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-06-01DOI: 10.1109/ICAICA50127.2020.9182562
Tian Yali, Bian De-zhi, Song Feifei
A collision detection method based on vehicle trajectory data is proposed to solve the vehicle safety problem in vehicular networking. First, this method gives the algorithm to extract the outlier data segment from the denoised trajectory data based on time series containing acceleration sensor data. After formalizing the concept of collision according to domain knowledge, the outlier data segment is further transformed into the feature vectors of collision. Finally, a binary classification task on collision detection is constructed. In the experimental environment and practical application, this method can overcome the large noise of driving scene, and has a better precision and recall. In addition, the trajectory data are generated from inexpensive on-board electronic equipment, it can show strong versatility and feasibility in the production environment.
{"title":"A Collision Detection Method Based on Vehicle Trajectory Data","authors":"Tian Yali, Bian De-zhi, Song Feifei","doi":"10.1109/ICAICA50127.2020.9182562","DOIUrl":"https://doi.org/10.1109/ICAICA50127.2020.9182562","url":null,"abstract":"A collision detection method based on vehicle trajectory data is proposed to solve the vehicle safety problem in vehicular networking. First, this method gives the algorithm to extract the outlier data segment from the denoised trajectory data based on time series containing acceleration sensor data. After formalizing the concept of collision according to domain knowledge, the outlier data segment is further transformed into the feature vectors of collision. Finally, a binary classification task on collision detection is constructed. In the experimental environment and practical application, this method can overcome the large noise of driving scene, and has a better precision and recall. In addition, the trajectory data are generated from inexpensive on-board electronic equipment, it can show strong versatility and feasibility in the production environment.","PeriodicalId":113564,"journal":{"name":"2020 IEEE International Conference on Artificial Intelligence and Computer Applications (ICAICA)","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114584498","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Internet finance is advantageous to improve financial market competition, enhance capital allocation efficiency and decrease financial service costs. Moreover it makes up the deficiencies of the traditional finance on the aspects of satisfaction of the wider populations on financial demands, enhancement of financial inclusiveness and improvement of financial service efficiency. However Internet finance is also a double-edged sword. As a new pattern and new mode in the financial field, the prevailing laws, policies and regulatory systems can not completely cover the risk vulnerabilities of internet finance. This paper adopted the fuzzy analytic hierarchy process and five quantitative representative influential factors to compare the risk. According to the empirical analysis, the first higher risk in the current internet finance of China is credit risk; following which, the risks are the business risk, legal risk and operational risk; therefore it is very necessary to launch effective regulation and supervision on the risks of Chinese internet finance from multiple aspects, such as credit system, laws and regulations, regulatory systems so as to promote the mutual development of internet finance and traditional finance; this is the core issue of Chinese internet finance development.
{"title":"Research on Risk Assessment and Control of Internet Finance in China","authors":"Shu-Rong Yan, Yin Liao, De-Hua Liu, Weihong Li, Li-Na Wang, Lin-Hua Peng, Xiaoxiao Tian, M. Tian, Hongli Huang","doi":"10.1109/ICAICA50127.2020.9181894","DOIUrl":"https://doi.org/10.1109/ICAICA50127.2020.9181894","url":null,"abstract":"Internet finance is advantageous to improve financial market competition, enhance capital allocation efficiency and decrease financial service costs. Moreover it makes up the deficiencies of the traditional finance on the aspects of satisfaction of the wider populations on financial demands, enhancement of financial inclusiveness and improvement of financial service efficiency. However Internet finance is also a double-edged sword. As a new pattern and new mode in the financial field, the prevailing laws, policies and regulatory systems can not completely cover the risk vulnerabilities of internet finance. This paper adopted the fuzzy analytic hierarchy process and five quantitative representative influential factors to compare the risk. According to the empirical analysis, the first higher risk in the current internet finance of China is credit risk; following which, the risks are the business risk, legal risk and operational risk; therefore it is very necessary to launch effective regulation and supervision on the risks of Chinese internet finance from multiple aspects, such as credit system, laws and regulations, regulatory systems so as to promote the mutual development of internet finance and traditional finance; this is the core issue of Chinese internet finance development.","PeriodicalId":113564,"journal":{"name":"2020 IEEE International Conference on Artificial Intelligence and Computer Applications (ICAICA)","volume":"136 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116744921","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The accurate detection of insulator profile of mine transmission line is the basis and premise of mine intelligent UAV (unmanned aerial vehicle) inspection, but it has not been effectively solved. In this paper, the mathematical model of traditional edge detection operator is first derivative operator: Robert operator, Prewitt operator, Sobel operator, and operators whose mathematical model is second derivative Laplacian operator, LOG operator, Canny operator and so on are studied comprehensively. These algorithms are applied to the insulator profile detection of transmission lines, and the experimental results are analyzed and compared.
{"title":"Insulator Profile Detection of Transmission Line Based on Traditional Edge Detection Algorithm","authors":"Chuanjiang Zhang, Xianfeng Liu, Baolin Chen, Peng Yin, Jian Li, Y. Li, Xiangyu Meng","doi":"10.1109/ICAICA50127.2020.9181907","DOIUrl":"https://doi.org/10.1109/ICAICA50127.2020.9181907","url":null,"abstract":"The accurate detection of insulator profile of mine transmission line is the basis and premise of mine intelligent UAV (unmanned aerial vehicle) inspection, but it has not been effectively solved. In this paper, the mathematical model of traditional edge detection operator is first derivative operator: Robert operator, Prewitt operator, Sobel operator, and operators whose mathematical model is second derivative Laplacian operator, LOG operator, Canny operator and so on are studied comprehensively. These algorithms are applied to the insulator profile detection of transmission lines, and the experimental results are analyzed and compared.","PeriodicalId":113564,"journal":{"name":"2020 IEEE International Conference on Artificial Intelligence and Computer Applications (ICAICA)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123113787","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-06-01DOI: 10.1109/ICAICA50127.2020.9181873
Wenchun Zhang, Hongyang Fan
This paper proposes a deep learning change detection method that uses the isolated forest algorithm to optimize the change detection results. Use the improved change vector analysis algorithm and gray level co-occurrence matrix algorithm to obtain the image spectrum and texture difference characteristics, select samples and train the deep confidence network model to detect the image change area; introduce the isolated forest algorithm to optimize the model detection result and get the change detection map. In the experiments based on the WHU Building Dataset, the accuracy and recall of the deep learning change detection results optimized by the method improved by 22.83% and 2.79%, respectively, and the false alarm rate and missed detection rate decreased by 36.88% and 2.79%, indicating that this article The method can effectively improve the accuracy of deep learning change detection, and has certain generalization value.
{"title":"Application of Isolated Forest Algorithm in Deep Learning Change Detection of High Resolution Remote Sensing Image","authors":"Wenchun Zhang, Hongyang Fan","doi":"10.1109/ICAICA50127.2020.9181873","DOIUrl":"https://doi.org/10.1109/ICAICA50127.2020.9181873","url":null,"abstract":"This paper proposes a deep learning change detection method that uses the isolated forest algorithm to optimize the change detection results. Use the improved change vector analysis algorithm and gray level co-occurrence matrix algorithm to obtain the image spectrum and texture difference characteristics, select samples and train the deep confidence network model to detect the image change area; introduce the isolated forest algorithm to optimize the model detection result and get the change detection map. In the experiments based on the WHU Building Dataset, the accuracy and recall of the deep learning change detection results optimized by the method improved by 22.83% and 2.79%, respectively, and the false alarm rate and missed detection rate decreased by 36.88% and 2.79%, indicating that this article The method can effectively improve the accuracy of deep learning change detection, and has certain generalization value.","PeriodicalId":113564,"journal":{"name":"2020 IEEE International Conference on Artificial Intelligence and Computer Applications (ICAICA)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124480733","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-06-01DOI: 10.1109/ICAICA50127.2020.9182587
Yu Ying, Sun Yue
Visual data mining uses data or knowledge visualization technology to discover hidden and useful knowledge from large data sets. It integrates two disciplines, data mining and data visualization, and integrates with computer graphics, multimedia systems, human-machine interface and other disciplines. Closely related, the purpose is to explain and evaluate the data to be mined and the results of the mining task in an intuitive and effective way. This thesis combines visualization technology and data mining technology to design a visual communication webpage design method based on multi-source data integration. The Deep Web crawler is used to retrieve the visual communication website. It uses crawling methods to filter URLs and crawl useful pages. The experimental results show that the intelligent power distribution management webpage designed by this method runs well, has high visualization performance and information mining quality, and has a good visual communication effect.
{"title":"Application of Data Mining Combined Visualization Technology in Visual Communication","authors":"Yu Ying, Sun Yue","doi":"10.1109/ICAICA50127.2020.9182587","DOIUrl":"https://doi.org/10.1109/ICAICA50127.2020.9182587","url":null,"abstract":"Visual data mining uses data or knowledge visualization technology to discover hidden and useful knowledge from large data sets. It integrates two disciplines, data mining and data visualization, and integrates with computer graphics, multimedia systems, human-machine interface and other disciplines. Closely related, the purpose is to explain and evaluate the data to be mined and the results of the mining task in an intuitive and effective way. This thesis combines visualization technology and data mining technology to design a visual communication webpage design method based on multi-source data integration. The Deep Web crawler is used to retrieve the visual communication website. It uses crawling methods to filter URLs and crawl useful pages. The experimental results show that the intelligent power distribution management webpage designed by this method runs well, has high visualization performance and information mining quality, and has a good visual communication effect.","PeriodicalId":113564,"journal":{"name":"2020 IEEE International Conference on Artificial Intelligence and Computer Applications (ICAICA)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124864000","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-06-01DOI: 10.1109/ICAICA50127.2020.9182603
Xin Wu, Zhenzhuo Wei, Yulu Hu, Lianming Wang
Many traffic sign detection algorithms suffer from poor robustness and low detection efficiency problems under poor environmental conditions, such as low illumination and sudden weather changes. Here, we propose a novel traffic sign detection algorithm based on multi-color space fusion. First, we select sensitive channels that can represent the color information of traffic signs by analyzing the color space. Second, the sensitive channels from the equalized image are extracted and fused to enhance the contrast of the area with the traffic sign colors. Additionally, an adaptive threshold setting method is used to binarize the fused image to acquire the candidate areas of traffic signs. Finally, non-traffic sign areas in the candidate areas are removed on the basis of the features of area, aspect ratio, and eccentricity. Results using two databases demonstrate that our proposed algorithm can effectively improve the detection rate and has a higher robustness under poor environmental conditions.
{"title":"Traffic Sign Detection Method Using Multi-Color Space Fusion","authors":"Xin Wu, Zhenzhuo Wei, Yulu Hu, Lianming Wang","doi":"10.1109/ICAICA50127.2020.9182603","DOIUrl":"https://doi.org/10.1109/ICAICA50127.2020.9182603","url":null,"abstract":"Many traffic sign detection algorithms suffer from poor robustness and low detection efficiency problems under poor environmental conditions, such as low illumination and sudden weather changes. Here, we propose a novel traffic sign detection algorithm based on multi-color space fusion. First, we select sensitive channels that can represent the color information of traffic signs by analyzing the color space. Second, the sensitive channels from the equalized image are extracted and fused to enhance the contrast of the area with the traffic sign colors. Additionally, an adaptive threshold setting method is used to binarize the fused image to acquire the candidate areas of traffic signs. Finally, non-traffic sign areas in the candidate areas are removed on the basis of the features of area, aspect ratio, and eccentricity. Results using two databases demonstrate that our proposed algorithm can effectively improve the detection rate and has a higher robustness under poor environmental conditions.","PeriodicalId":113564,"journal":{"name":"2020 IEEE International Conference on Artificial Intelligence and Computer Applications (ICAICA)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124864311","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-06-01DOI: 10.1109/ICAICA50127.2020.9182627
Beibei Wang, Xue Yuan, Bo Li
In engineering, manufacturing, electronic industry, transportation and other industries, a large number of paper drawings have been accumulated. These paper drawings are an important resource accumulation of the companies. Paper drawings have some disadvantages, such as inconvenient to save, unable to establish database to realize resource reuse and so on. Therefore, this paper proposes a new algorithm of unattended drawing computerization and database intelligent establishment. Firstly, the position of the key text area is located according to the deep learning object detection algorithm, then the text lines in the text area are detected and the text is recognized. Finally, the database is established according to the recognition results. The experimental results show that the average accuracy of the proposed algorithm is 98.6%. Compared with the existing drawing retrieval algorithm, the algorithm uses deep learning object detection algorithm to initially locate the text area. It can further improve the accuracy of drawing information extraction, and realize the unattended paper drawing computerization and intelligent establishment of database.
{"title":"Drawing Computerization and Intelligent Database Building Algorithm","authors":"Beibei Wang, Xue Yuan, Bo Li","doi":"10.1109/ICAICA50127.2020.9182627","DOIUrl":"https://doi.org/10.1109/ICAICA50127.2020.9182627","url":null,"abstract":"In engineering, manufacturing, electronic industry, transportation and other industries, a large number of paper drawings have been accumulated. These paper drawings are an important resource accumulation of the companies. Paper drawings have some disadvantages, such as inconvenient to save, unable to establish database to realize resource reuse and so on. Therefore, this paper proposes a new algorithm of unattended drawing computerization and database intelligent establishment. Firstly, the position of the key text area is located according to the deep learning object detection algorithm, then the text lines in the text area are detected and the text is recognized. Finally, the database is established according to the recognition results. The experimental results show that the average accuracy of the proposed algorithm is 98.6%. Compared with the existing drawing retrieval algorithm, the algorithm uses deep learning object detection algorithm to initially locate the text area. It can further improve the accuracy of drawing information extraction, and realize the unattended paper drawing computerization and intelligent establishment of database.","PeriodicalId":113564,"journal":{"name":"2020 IEEE International Conference on Artificial Intelligence and Computer Applications (ICAICA)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123870782","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-06-01DOI: 10.1109/ICAICA50127.2020.9182561
Jianyu Liu, Ti Sun, Chinhua Wang
An ultra-thin and flexible multi-frequency perfect absorber based on metasurface in microwave regime is proposed and analyzed. The absorbing device is composed of a thin conductive film combined with an in-phase all-reflecting metal-dielectric-metal cavity, from which nearly perfect absorption can be implemented due to coherent cancellation of the electromagnetic wave inside the conductive film. Detailed characteristics of the absorption on the structural parameters including both thicknesses of the layered structure and arrangement of the metasurface patterns of the device are investigated and analyzed. Simultaneous multiple frequency absorption using a single device is proposed and implemented using multiple nested metasurface patterns, from which a 3-frequency microwave perfect absorber is obtained and optimized with a total thickness of only ~0.2 mm in the frequency range of 6 GHz −10 GHz. The proposed method provides a possible way of implementing an ultrathin and flexible microwave absorber which is of great importance in practical applications.
{"title":"Metasurface based Ultra-Thin and Flexible Multi-Frequency Perfect Absorber in Microwave Regime","authors":"Jianyu Liu, Ti Sun, Chinhua Wang","doi":"10.1109/ICAICA50127.2020.9182561","DOIUrl":"https://doi.org/10.1109/ICAICA50127.2020.9182561","url":null,"abstract":"An ultra-thin and flexible multi-frequency perfect absorber based on metasurface in microwave regime is proposed and analyzed. The absorbing device is composed of a thin conductive film combined with an in-phase all-reflecting metal-dielectric-metal cavity, from which nearly perfect absorption can be implemented due to coherent cancellation of the electromagnetic wave inside the conductive film. Detailed characteristics of the absorption on the structural parameters including both thicknesses of the layered structure and arrangement of the metasurface patterns of the device are investigated and analyzed. Simultaneous multiple frequency absorption using a single device is proposed and implemented using multiple nested metasurface patterns, from which a 3-frequency microwave perfect absorber is obtained and optimized with a total thickness of only ~0.2 mm in the frequency range of 6 GHz −10 GHz. The proposed method provides a possible way of implementing an ultrathin and flexible microwave absorber which is of great importance in practical applications.","PeriodicalId":113564,"journal":{"name":"2020 IEEE International Conference on Artificial Intelligence and Computer Applications (ICAICA)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125739318","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}