Pub Date : 2021-09-24DOI: 10.1109/ICISCAE52414.2021.9590703
Juchen Hong, Zhiping Fan, Zhengyun Ren
For the purpose of improving the stability of outlet temperature and the rapidness of temperature control system, a multi-cascade control scheme is designed based on the relationship between circulating wind and tobacco leaf temperature through the analysis of actual sampling values. The scheme adopts a three closed-loop strategy, the system model was identified by correlation analysis and the least square method, the inner and outer loop sub-controllers and the main controllers all use the predictive PI(Proportion Integration) controller. The simulation and practical application results show that comparing to the double cascade control, the multi-cascade control can effectively improve the response speed of the system, and the dynamic performance of the system. Among them, this scheme reduces the rise time by 40.4 % compared with the double-closed loop cascading system. The adverse effect of interference on the main circuit is further reduced by adding secondary circuit. Predictive PI algorithm may alleviate the large time delay of temperature control, and has good anti-interference and robustness. The overshoot after adding disturbance is only 86.3 % of the control system using fuzzy controller. This solution may provide support for accurately and stably controlling the outlet temperature of the ordering-cylinder.
{"title":"Application of Predictive PI and Multiple Cascade Control in Ordering-cylinder","authors":"Juchen Hong, Zhiping Fan, Zhengyun Ren","doi":"10.1109/ICISCAE52414.2021.9590703","DOIUrl":"https://doi.org/10.1109/ICISCAE52414.2021.9590703","url":null,"abstract":"For the purpose of improving the stability of outlet temperature and the rapidness of temperature control system, a multi-cascade control scheme is designed based on the relationship between circulating wind and tobacco leaf temperature through the analysis of actual sampling values. The scheme adopts a three closed-loop strategy, the system model was identified by correlation analysis and the least square method, the inner and outer loop sub-controllers and the main controllers all use the predictive PI(Proportion Integration) controller. The simulation and practical application results show that comparing to the double cascade control, the multi-cascade control can effectively improve the response speed of the system, and the dynamic performance of the system. Among them, this scheme reduces the rise time by 40.4 % compared with the double-closed loop cascading system. The adverse effect of interference on the main circuit is further reduced by adding secondary circuit. Predictive PI algorithm may alleviate the large time delay of temperature control, and has good anti-interference and robustness. The overshoot after adding disturbance is only 86.3 % of the control system using fuzzy controller. This solution may provide support for accurately and stably controlling the outlet temperature of the ordering-cylinder.","PeriodicalId":121049,"journal":{"name":"2021 IEEE 4th International Conference on Information Systems and Computer Aided Education (ICISCAE)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125952985","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
With the development of technology, positioning systems have shifted from outdoor to indoor and from low precision to high precision. The indoor positioning has put forward greater demands on many applications including indoor robot navigation. Aiming at improving the accuracy, cost, and stability of indoor localization, this paper proposed a single base station positioning approach for robots based on the fusion of UWB, IMU, and encoder sensors. With the combination of several sensors, robots that carry UWB tags can achieve high accuracy localization and well robustness in an indoor environment. It has been validated in indoor corridors and passages. Compared with traditional multi-base station positioning methods, the approach which we proposed cuts the positioning cost and improves flexibility. Experiments are carried out to validate the localization performance. The results confirm that the average positioning errors can meet requirements in most indoor scenes.
{"title":"Single Base Station Positioning for Robots Based on Multiple Sensor Fusion","authors":"Yuanhao Ding, Lurong Jiang, Jiang Wu, Meng Li, Liwen Jing, Wei Li","doi":"10.1109/ICISCAE52414.2021.9590722","DOIUrl":"https://doi.org/10.1109/ICISCAE52414.2021.9590722","url":null,"abstract":"With the development of technology, positioning systems have shifted from outdoor to indoor and from low precision to high precision. The indoor positioning has put forward greater demands on many applications including indoor robot navigation. Aiming at improving the accuracy, cost, and stability of indoor localization, this paper proposed a single base station positioning approach for robots based on the fusion of UWB, IMU, and encoder sensors. With the combination of several sensors, robots that carry UWB tags can achieve high accuracy localization and well robustness in an indoor environment. It has been validated in indoor corridors and passages. Compared with traditional multi-base station positioning methods, the approach which we proposed cuts the positioning cost and improves flexibility. Experiments are carried out to validate the localization performance. The results confirm that the average positioning errors can meet requirements in most indoor scenes.","PeriodicalId":121049,"journal":{"name":"2021 IEEE 4th International Conference on Information Systems and Computer Aided Education (ICISCAE)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129342319","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-09-24DOI: 10.1109/ICISCAE52414.2021.9590787
Shu Xu, Jiayu Liu
As the representative of many information technologies, navigation technology is quietly entering the details of human life. How to adapt to complex environment and fuse multi-sensor information to achieve more accurate positioning has become the key of navigation technology. Facing the requirements of high-precision and reliable positioning technology, aiming at the problems of low positioning accuracy and poor robustness caused by incomplete information of single source positioning technology, this paper focuses on the fusion positioning method of wireless signal, pedestrian dead reckoning (PDR) and map information based on particle filter (PF), and proposes an adaptive vector particle filter algorithm, A personal navigation (PND) system based on adaptive vector particle filter is designed, which can effectively improve the positioning performance. The experimental results show that the navigation results can correctly reflect the changing process of the attitude, speed and position of the pedestrian's foot. The position error of the navigation algorithm is positively correlated with the walking distance and the number of walking steps, and the relative error between the position error and the traveling distance is about 5%.
{"title":"Research on algorithm of personal navigation system based on adaptive vector particle filter","authors":"Shu Xu, Jiayu Liu","doi":"10.1109/ICISCAE52414.2021.9590787","DOIUrl":"https://doi.org/10.1109/ICISCAE52414.2021.9590787","url":null,"abstract":"As the representative of many information technologies, navigation technology is quietly entering the details of human life. How to adapt to complex environment and fuse multi-sensor information to achieve more accurate positioning has become the key of navigation technology. Facing the requirements of high-precision and reliable positioning technology, aiming at the problems of low positioning accuracy and poor robustness caused by incomplete information of single source positioning technology, this paper focuses on the fusion positioning method of wireless signal, pedestrian dead reckoning (PDR) and map information based on particle filter (PF), and proposes an adaptive vector particle filter algorithm, A personal navigation (PND) system based on adaptive vector particle filter is designed, which can effectively improve the positioning performance. The experimental results show that the navigation results can correctly reflect the changing process of the attitude, speed and position of the pedestrian's foot. The position error of the navigation algorithm is positively correlated with the walking distance and the number of walking steps, and the relative error between the position error and the traveling distance is about 5%.","PeriodicalId":121049,"journal":{"name":"2021 IEEE 4th International Conference on Information Systems and Computer Aided Education (ICISCAE)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133681552","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-09-24DOI: 10.1109/ICISCAE52414.2021.9590700
Jinming Du
With the development of Internet and information technology, data has become an important asset related to the development prospects of society and all walks of life. At present, there are many quality problems in the use of educational data, which has brought great obstacles to exerting the value of educational data. Only by using scientific statistical methods, obtaining real, objective, comprehensive, scientific and effective basic data, and carrying out systematic and comprehensive analysis on the obtained data, can we give full play to its command and decision-making role. The development of big data and artificial intelligence technology provides new ideas for the analysis and evaluation of educational data quality, and is committed to restoring the overall picture of the education system and promoting the change of regional educational ecology. In this paper, an educational data quality analysis model based on multiple constraint model is proposed, which classifies the data in the database, divides the information in the database into several different categories according to the data characteristics, and establishes a quality management system for educational data in universities, so as to effectively improve the quality of educational data.
{"title":"Research on the Construction of Educational Data Quality Model Based on Multiple Constraints Model","authors":"Jinming Du","doi":"10.1109/ICISCAE52414.2021.9590700","DOIUrl":"https://doi.org/10.1109/ICISCAE52414.2021.9590700","url":null,"abstract":"With the development of Internet and information technology, data has become an important asset related to the development prospects of society and all walks of life. At present, there are many quality problems in the use of educational data, which has brought great obstacles to exerting the value of educational data. Only by using scientific statistical methods, obtaining real, objective, comprehensive, scientific and effective basic data, and carrying out systematic and comprehensive analysis on the obtained data, can we give full play to its command and decision-making role. The development of big data and artificial intelligence technology provides new ideas for the analysis and evaluation of educational data quality, and is committed to restoring the overall picture of the education system and promoting the change of regional educational ecology. In this paper, an educational data quality analysis model based on multiple constraint model is proposed, which classifies the data in the database, divides the information in the database into several different categories according to the data characteristics, and establishes a quality management system for educational data in universities, so as to effectively improve the quality of educational data.","PeriodicalId":121049,"journal":{"name":"2021 IEEE 4th International Conference on Information Systems and Computer Aided Education (ICISCAE)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133727800","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-09-24DOI: 10.1109/ICISCAE52414.2021.9590814
Rongjian Zhang
Data mining technology can accurately extract useful information from a large amount of information data, and also has the function of removing falsehood and preserving truth, so it has a very important application in intelligent system set. The essential condition of intelligent building is building intelligence, and the core of intelligent building system design is system integration. The main goal of intelligent building system integration is to realize information integration, and data warehouse technology is an effective solution to solve the problem of intelligent building information integration. Data mining technology is used to analyze and process various kinds of massive data and information, so as to realize the conversion from data to information and provide effective support for leaders' decision-making. The new model of building intelligent system integration based on data mining technology proposed in this paper has solved the compatibility and openness problems in the process of building intelligent system integration, and achieved the goal of safe and efficient building intelligent system.
{"title":"Research on Application of Intelligent System Integration Based on Data Mining Technology","authors":"Rongjian Zhang","doi":"10.1109/ICISCAE52414.2021.9590814","DOIUrl":"https://doi.org/10.1109/ICISCAE52414.2021.9590814","url":null,"abstract":"Data mining technology can accurately extract useful information from a large amount of information data, and also has the function of removing falsehood and preserving truth, so it has a very important application in intelligent system set. The essential condition of intelligent building is building intelligence, and the core of intelligent building system design is system integration. The main goal of intelligent building system integration is to realize information integration, and data warehouse technology is an effective solution to solve the problem of intelligent building information integration. Data mining technology is used to analyze and process various kinds of massive data and information, so as to realize the conversion from data to information and provide effective support for leaders' decision-making. The new model of building intelligent system integration based on data mining technology proposed in this paper has solved the compatibility and openness problems in the process of building intelligent system integration, and achieved the goal of safe and efficient building intelligent system.","PeriodicalId":121049,"journal":{"name":"2021 IEEE 4th International Conference on Information Systems and Computer Aided Education (ICISCAE)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129425690","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-09-24DOI: 10.1109/ICISCAE52414.2021.9590763
Shih Pan, Zhixuan Xiao
In the context of the accelerating process of information technology in the international society, information security has become the focus of attention of the whole society. How to ensure communication security in the application of information communication has become the main direction of research and exploration. Therefore, on the basis of understanding the good cryptographic system, this paper analyzes how to design the practical information security system for the two commonly used cryptographic algorithms.
{"title":"Design of the Information Security System Based on the Encryption Mechanism","authors":"Shih Pan, Zhixuan Xiao","doi":"10.1109/ICISCAE52414.2021.9590763","DOIUrl":"https://doi.org/10.1109/ICISCAE52414.2021.9590763","url":null,"abstract":"In the context of the accelerating process of information technology in the international society, information security has become the focus of attention of the whole society. How to ensure communication security in the application of information communication has become the main direction of research and exploration. Therefore, on the basis of understanding the good cryptographic system, this paper analyzes how to design the practical information security system for the two commonly used cryptographic algorithms.","PeriodicalId":121049,"journal":{"name":"2021 IEEE 4th International Conference on Information Systems and Computer Aided Education (ICISCAE)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127421301","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-09-24DOI: 10.1109/ICISCAE52414.2021.9590813
Gang Chen
In communication network mega data, unstructured data is characterized by large scale, diversity and timeliness. Traditional unstructured processing methods have been difficult to meet the data processing needs. Complex data sets and large data orders in modern mega data require professional analysis tools to realize analysis. Information fusion is a multi-source information processing technology, which can optimize and synthesize redundant information from multiple sensors in space and time, and obtain more accurate and complete values than single information source, and obtain the consistent description of the measured object. In order to effectively solve the problem of unstructured data model of communication network mega data, this paper proposes an algorithm for unstructured data analysis of communication network based on feature fusion, and analyzes the key problems in the process of unstructured data feature modeling, such as the storage of original data and feature data, the selection of feature space, information query and data visualization.
{"title":"Research on Unstructured Mega Data Analysis Algorithm of Communication Network Based on Feature Fusion","authors":"Gang Chen","doi":"10.1109/ICISCAE52414.2021.9590813","DOIUrl":"https://doi.org/10.1109/ICISCAE52414.2021.9590813","url":null,"abstract":"In communication network mega data, unstructured data is characterized by large scale, diversity and timeliness. Traditional unstructured processing methods have been difficult to meet the data processing needs. Complex data sets and large data orders in modern mega data require professional analysis tools to realize analysis. Information fusion is a multi-source information processing technology, which can optimize and synthesize redundant information from multiple sensors in space and time, and obtain more accurate and complete values than single information source, and obtain the consistent description of the measured object. In order to effectively solve the problem of unstructured data model of communication network mega data, this paper proposes an algorithm for unstructured data analysis of communication network based on feature fusion, and analyzes the key problems in the process of unstructured data feature modeling, such as the storage of original data and feature data, the selection of feature space, information query and data visualization.","PeriodicalId":121049,"journal":{"name":"2021 IEEE 4th International Conference on Information Systems and Computer Aided Education (ICISCAE)","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123578565","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-09-24DOI: 10.1109/ICISCAE52414.2021.9590784
WeiSheng Wen, Jun Ma, Shuqin Liu
The logistics network is composed of lines and nodes. The traditional logistics is too centralized, so it is necessary to try “decentralization” to reduce the management difficulty and operational risk. This paper proposes a security data management method based on blockchain to manage distributed logistics network system. Through IOT technology, the warehouse will be connected by tagging individual items and operating hardware to improve the transparency and localization of all assets. The client of IOT node encrypts the logistics transaction data and uploads it to the blockchain to ensure the privacy and unforgeability of the logistics information, so that the encrypted data can be decrypted by the system nodes and uploaded to the blockchain through the logistics network. According to the experiment of school enterprise cooperation enterprise, this is a sharing framework with high security and high availability.
{"title":"Data security management of logistics network based on blockchain technology","authors":"WeiSheng Wen, Jun Ma, Shuqin Liu","doi":"10.1109/ICISCAE52414.2021.9590784","DOIUrl":"https://doi.org/10.1109/ICISCAE52414.2021.9590784","url":null,"abstract":"The logistics network is composed of lines and nodes. The traditional logistics is too centralized, so it is necessary to try “decentralization” to reduce the management difficulty and operational risk. This paper proposes a security data management method based on blockchain to manage distributed logistics network system. Through IOT technology, the warehouse will be connected by tagging individual items and operating hardware to improve the transparency and localization of all assets. The client of IOT node encrypts the logistics transaction data and uploads it to the blockchain to ensure the privacy and unforgeability of the logistics information, so that the encrypted data can be decrypted by the system nodes and uploaded to the blockchain through the logistics network. According to the experiment of school enterprise cooperation enterprise, this is a sharing framework with high security and high availability.","PeriodicalId":121049,"journal":{"name":"2021 IEEE 4th International Conference on Information Systems and Computer Aided Education (ICISCAE)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123085465","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-09-24DOI: 10.1109/ICISCAE52414.2021.9590666
Xiao Bao
How to use computer vision technology to automatically identify and analyze human behavior in video has become a research hotspot. In traditional behavior recognition methods, features need to be extracted manually, and the recognition effect of features largely depends on the experience of feature designers. This paper takes the dual-stream convolutional neural network as the basic theory, and uses the TSN (Temporal Segment Networks) model as the basic framework to analyze the shortcomings and shortcomings of the single-stream network and the original dual-stream network. A multi-modal human behavior recognition model based on dual-stream network is proposed. In order to extract video-level features effectively, this model adopts two attention mechanisms, which are used to learn image frame features and video-level feature transfer. Then, CNN is used to extract global motion features, and finally, it is fused with spatio-temporal features. The fusion feature is evaluated on the public data set, and the results show that the two features are complementary, and their fusion makes the features more expressive, and the recognition result on the public data set is greatly improved compared with the single spatio-temporal feature.
{"title":"Research on Multimodal Human Behavior Recognition Based on Double Flow Network","authors":"Xiao Bao","doi":"10.1109/ICISCAE52414.2021.9590666","DOIUrl":"https://doi.org/10.1109/ICISCAE52414.2021.9590666","url":null,"abstract":"How to use computer vision technology to automatically identify and analyze human behavior in video has become a research hotspot. In traditional behavior recognition methods, features need to be extracted manually, and the recognition effect of features largely depends on the experience of feature designers. This paper takes the dual-stream convolutional neural network as the basic theory, and uses the TSN (Temporal Segment Networks) model as the basic framework to analyze the shortcomings and shortcomings of the single-stream network and the original dual-stream network. A multi-modal human behavior recognition model based on dual-stream network is proposed. In order to extract video-level features effectively, this model adopts two attention mechanisms, which are used to learn image frame features and video-level feature transfer. Then, CNN is used to extract global motion features, and finally, it is fused with spatio-temporal features. The fusion feature is evaluated on the public data set, and the results show that the two features are complementary, and their fusion makes the features more expressive, and the recognition result on the public data set is greatly improved compared with the single spatio-temporal feature.","PeriodicalId":121049,"journal":{"name":"2021 IEEE 4th International Conference on Information Systems and Computer Aided Education (ICISCAE)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115616492","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-09-24DOI: 10.1109/ICISCAE52414.2021.9590725
Zhong Ma, Hongqi Yu, Shiqing Zhang, Yi Sun, Jietao Diao, Day-Uei Li
Memristors show excellent ductility and low power consumption. They have broad applications in logic circuits, neuromorphic computing and non-volatile memory. Memristors show great potential in true random number generation (TRNG). To verify memristors' randomness, we made two kinds of memristors, measured the randomness of their delays, and investigated their different randomness mechanisms. We did thousands of experiments and verified the feasibility of making a new TRNG using these two kinds of memristors. We also found a new application of memristors to make non-linear device.
{"title":"Random time delay analysis of Nb2O5 and OTS memristors","authors":"Zhong Ma, Hongqi Yu, Shiqing Zhang, Yi Sun, Jietao Diao, Day-Uei Li","doi":"10.1109/ICISCAE52414.2021.9590725","DOIUrl":"https://doi.org/10.1109/ICISCAE52414.2021.9590725","url":null,"abstract":"Memristors show excellent ductility and low power consumption. They have broad applications in logic circuits, neuromorphic computing and non-volatile memory. Memristors show great potential in true random number generation (TRNG). To verify memristors' randomness, we made two kinds of memristors, measured the randomness of their delays, and investigated their different randomness mechanisms. We did thousands of experiments and verified the feasibility of making a new TRNG using these two kinds of memristors. We also found a new application of memristors to make non-linear device.","PeriodicalId":121049,"journal":{"name":"2021 IEEE 4th International Conference on Information Systems and Computer Aided Education (ICISCAE)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124144323","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}