首页 > 最新文献

Proceedings of the 3rd International Conference on Mechatronics Engineering and Information Technology (ICMEIT 2019)最新文献

英文 中文
Vehicle Type Classification based on Improved HOG_SVM 基于改进HOG_SVM的车型分类
Peng Ge, Yanping Hu
There are few differences in the characteristics of vehicles and many interference factors in vehicle identification, especially in complex backgrounds. In order to improve the accuracy of image feature extraction and recognition in complex background, a vehicle-types recognition technology based on improved HOG_SVM is proposed in this paper. In order to obtain abundant vehicle identification information, we perform targeted image preprocessing methods such as grayscale stretching and Gaussian filtering on the original image to reduce background interference factors. The HOG feature is then introduced to obtain rich features of the image, and the SVM classifier in machine learning is trained at the output layer by multitasking learning of a large amount of tagged data. Different from the traditional method, the PCA dimension reduction process is used to speed up the recognition of the improved HOG feature, and the method of SVM is used to avoid the classifier from falling into the local minimum. In this paper, the public vehicle dataset is used as the classifier training dataset and test dataset, and the proposed method is verified by experiments.
车辆特征差异不大,车辆识别中干扰因素较多,特别是在复杂背景下。为了提高复杂背景下图像特征提取和识别的精度,本文提出了一种基于改进HOG_SVM的车型识别技术。为了获得丰富的车辆识别信息,我们对原始图像进行了有针对性的图像预处理方法,如灰度拉伸和高斯滤波,以减少背景干扰因素。然后引入HOG特征获得图像的丰富特征,通过对大量标记数据的多任务学习,在输出层训练机器学习中的SVM分类器。与传统方法不同的是,采用PCA降维过程加快对改进HOG特征的识别,采用SVM方法避免分类器陷入局部最小值。本文以公共车辆数据集作为分类器的训练数据集和测试数据集,并通过实验验证了所提出的方法。
{"title":"Vehicle Type Classification based on Improved HOG_SVM","authors":"Peng Ge, Yanping Hu","doi":"10.2991/ICMEIT-19.2019.102","DOIUrl":"https://doi.org/10.2991/ICMEIT-19.2019.102","url":null,"abstract":"There are few differences in the characteristics of vehicles and many interference factors in vehicle identification, especially in complex backgrounds. In order to improve the accuracy of image feature extraction and recognition in complex background, a vehicle-types recognition technology based on improved HOG_SVM is proposed in this paper. In order to obtain abundant vehicle identification information, we perform targeted image preprocessing methods such as grayscale stretching and Gaussian filtering on the original image to reduce background interference factors. The HOG feature is then introduced to obtain rich features of the image, and the SVM classifier in machine learning is trained at the output layer by multitasking learning of a large amount of tagged data. Different from the traditional method, the PCA dimension reduction process is used to speed up the recognition of the improved HOG feature, and the method of SVM is used to avoid the classifier from falling into the local minimum. In this paper, the public vehicle dataset is used as the classifier training dataset and test dataset, and the proposed method is verified by experiments.","PeriodicalId":223458,"journal":{"name":"Proceedings of the 3rd International Conference on Mechatronics Engineering and Information Technology (ICMEIT 2019)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128815293","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Study on Student Growth Tracking System based on Educational Big Data 基于教育大数据的学生成长跟踪系统研究
Chongli Zhong, Zhenyu Cao
{"title":"Study on Student Growth Tracking System based on Educational Big Data","authors":"Chongli Zhong, Zhenyu Cao","doi":"10.2991/ICMEIT-19.2019.33","DOIUrl":"https://doi.org/10.2991/ICMEIT-19.2019.33","url":null,"abstract":"","PeriodicalId":223458,"journal":{"name":"Proceedings of the 3rd International Conference on Mechatronics Engineering and Information Technology (ICMEIT 2019)","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127715463","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Encryption Technology in Information System Security 信息系统安全中的加密技术
Suo Siliang, W. Xi, C. Tiantian, Jian Ganyang, Hao Yao, Jin Li
With the rapid development of network, all kinds of information systems bring convenience to enterprises at the same time, it also brings more and more hidden dangers to information security. Encryption technology is the core technology of network security technology, which plays an increasingly important role in protecting network information security. This paper analyses the current information encryption technology, expounds the advantages and disadvantages of encryption algorithm, and expounds the application scenario and development trend of encryption technology.
随着网络的飞速发展,各种信息系统在给企业带来便利的同时,也给信息安全带来了越来越多的隐患。加密技术是网络安全技术的核心技术,在保护网络信息安全方面发挥着越来越重要的作用。本文分析了目前的信息加密技术,阐述了加密算法的优缺点,阐述了加密技术的应用场景和发展趋势。
{"title":"Encryption Technology in Information System Security","authors":"Suo Siliang, W. Xi, C. Tiantian, Jian Ganyang, Hao Yao, Jin Li","doi":"10.2991/ICMEIT-19.2019.80","DOIUrl":"https://doi.org/10.2991/ICMEIT-19.2019.80","url":null,"abstract":"With the rapid development of network, all kinds of information systems bring convenience to enterprises at the same time, it also brings more and more hidden dangers to information security. Encryption technology is the core technology of network security technology, which plays an increasingly important role in protecting network information security. This paper analyses the current information encryption technology, expounds the advantages and disadvantages of encryption algorithm, and expounds the application scenario and development trend of encryption technology.","PeriodicalId":223458,"journal":{"name":"Proceedings of the 3rd International Conference on Mechatronics Engineering and Information Technology (ICMEIT 2019)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126285855","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design and Application of Fault Injection System for Testability Verification Test 可测试性验证试验故障注入系统的设计与应用
Wenhao Qiu, Guangyao Lian, Huijie Li, Tian Xiao
A general fault injection system is designed for the problem that the existing fault injection equipment cannot meet the requirements of testability verification test. Firstly, according to the requirements of testability verification test for fault injection and state monitoring, an injection system framework including hardware platform and software platform is designed. The detailed design scheme of the system hardware platform, as well as the design architecture and operating principle of the software platform are presented. Then, various fault injectors are integrated, and the signaloriented fault model is constructed to realize the effective simulation of the fault. Finally, the system is applied to the testability verification test of a control system, and 58 fault samples are actually injected, which shows that the system can meet the requirements of the testability verification test.
针对现有故障注入设备不能满足可测试性验证试验要求的问题,设计了通用故障注入系统。首先,根据故障注入和状态监测的可测试性验证测试要求,设计了注入系统的硬件平台和软件平台框架。给出了系统硬件平台的详细设计方案,以及软件平台的设计体系结构和工作原理。然后,集成各种故障注入器,构建面向信号的故障模型,实现对故障的有效仿真;最后,将该系统应用于某控制系统的可测试性验证试验,实际注入了58个故障样本,表明该系统能够满足可测试性验证试验的要求。
{"title":"Design and Application of Fault Injection System for Testability Verification Test","authors":"Wenhao Qiu, Guangyao Lian, Huijie Li, Tian Xiao","doi":"10.2991/ICMEIT-19.2019.49","DOIUrl":"https://doi.org/10.2991/ICMEIT-19.2019.49","url":null,"abstract":"A general fault injection system is designed for the problem that the existing fault injection equipment cannot meet the requirements of testability verification test. Firstly, according to the requirements of testability verification test for fault injection and state monitoring, an injection system framework including hardware platform and software platform is designed. The detailed design scheme of the system hardware platform, as well as the design architecture and operating principle of the software platform are presented. Then, various fault injectors are integrated, and the signaloriented fault model is constructed to realize the effective simulation of the fault. Finally, the system is applied to the testability verification test of a control system, and 58 fault samples are actually injected, which shows that the system can meet the requirements of the testability verification test.","PeriodicalId":223458,"journal":{"name":"Proceedings of the 3rd International Conference on Mechatronics Engineering and Information Technology (ICMEIT 2019)","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121667536","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design and Implementation of Hardware Accelerator for Recommendation System based on Heterogeneous Computing Platform 基于异构计算平台的推荐系统硬件加速器的设计与实现
Yang Li, Z. Dai
This study takes advantage of the combination of heterogeneous platform control and computing power, and optimizes the parallelization of the popular collaborative filtering recommendation algorithm. Compared with the traditional algorithm, the speedup has a certain degree of improvement and power consumption has also declined as well. Keyowrds: heterogeneous computing platform, Recommendation System.
本研究利用异构平台控制与计算能力相结合的优势,对目前流行的协同过滤推荐算法的并行化进行优化。与传统算法相比,加速速度有一定程度的提高,功耗也有所下降。关键词:异构计算平台;推荐系统;
{"title":"Design and Implementation of Hardware Accelerator for Recommendation System based on Heterogeneous Computing Platform","authors":"Yang Li, Z. Dai","doi":"10.2991/ICMEIT-19.2019.150","DOIUrl":"https://doi.org/10.2991/ICMEIT-19.2019.150","url":null,"abstract":"This study takes advantage of the combination of heterogeneous platform control and computing power, and optimizes the parallelization of the popular collaborative filtering recommendation algorithm. Compared with the traditional algorithm, the speedup has a certain degree of improvement and power consumption has also declined as well. Keyowrds: heterogeneous computing platform, Recommendation System.","PeriodicalId":223458,"journal":{"name":"Proceedings of the 3rd International Conference on Mechatronics Engineering and Information Technology (ICMEIT 2019)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117289560","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Power Allocation in Massive MIMO System with Energy Harvesting Base Station 基于能量收集基站的大规模MIMO系统的功率分配
Guomin Li, Ning Li, Lihua Pang
Abstract. This paper studies a resource allocation method based on power optimization for singlecell multi-user downlink Massive MIMO wireless communication system with energy harvesting function. The proposed method uses a ZF precede for precoding. Under the premise that the noncausal knowledge of the energy harvesting process is available, the base station only uses renewable energy to provide the energy required for the system to operate. The relationship between power and system throughput is derived with consideration of both battery capacity constraints and energy causal constraints. Through the Varangian dual method, resource utilization is optimized. The simulation results show that the proposed algorithm tends to converge with fewer iterations.
摘要研究了一种基于功率优化的单细胞多用户下行海量MIMO无线通信系统的资源分配方法。该方法采用ZF前置进行预编码。在获得能量收集过程的非因果知识的前提下,基站仅使用可再生能源提供系统运行所需的能量。在考虑电池容量约束和能量因果约束的情况下,导出了功率与系统吞吐量的关系。通过Varangian对偶法,优化了资源利用。仿真结果表明,该算法迭代次数越少,收敛性越好。
{"title":"Power Allocation in Massive MIMO System with Energy Harvesting Base Station","authors":"Guomin Li, Ning Li, Lihua Pang","doi":"10.2991/ICMEIT-19.2019.101","DOIUrl":"https://doi.org/10.2991/ICMEIT-19.2019.101","url":null,"abstract":"Abstract. This paper studies a resource allocation method based on power optimization for singlecell multi-user downlink Massive MIMO wireless communication system with energy harvesting function. The proposed method uses a ZF precede for precoding. Under the premise that the noncausal knowledge of the energy harvesting process is available, the base station only uses renewable energy to provide the energy required for the system to operate. The relationship between power and system throughput is derived with consideration of both battery capacity constraints and energy causal constraints. Through the Varangian dual method, resource utilization is optimized. The simulation results show that the proposed algorithm tends to converge with fewer iterations.","PeriodicalId":223458,"journal":{"name":"Proceedings of the 3rd International Conference on Mechatronics Engineering and Information Technology (ICMEIT 2019)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131527324","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on Development Strategy of Space Security based on AHP-SWOT 基于AHP-SWOT的空间安全发展战略研究
Shuxing Feng, X. Su, Yongping Wang
. It is becoming the high topic to keep space security in the world, and it is great useful for making decision and making a choice to analyze development strategy of space security based on SWOT, with analyzing the strength, the weakness, the opportunity the threat, with qualitative estimate and quantitative evaluation which depends on applying the matrix model about the influent factors and strategy measures. To some extent, it uses for reference to carry out development strategy.
。维护空间安全已成为当今世界的热门话题,基于SWOT分析空间安全发展战略,分析空间安全发展战略的优势、劣势、机会和威胁,运用矩阵模型对影响因素和战略措施进行定性估计和定量评价,对决策和选择具有重要意义。在一定程度上对实施发展战略具有借鉴意义。
{"title":"Research on Development Strategy of Space Security based on AHP-SWOT","authors":"Shuxing Feng, X. Su, Yongping Wang","doi":"10.2991/ICMEIT-19.2019.151","DOIUrl":"https://doi.org/10.2991/ICMEIT-19.2019.151","url":null,"abstract":". It is becoming the high topic to keep space security in the world, and it is great useful for making decision and making a choice to analyze development strategy of space security based on SWOT, with analyzing the strength, the weakness, the opportunity the threat, with qualitative estimate and quantitative evaluation which depends on applying the matrix model about the influent factors and strategy measures. To some extent, it uses for reference to carry out development strategy.","PeriodicalId":223458,"journal":{"name":"Proceedings of the 3rd International Conference on Mechatronics Engineering and Information Technology (ICMEIT 2019)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127360515","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Prediction of Terrorist Attacks in China based on BP improved Algorithm and GTD 基于BP改进算法和GTD的中国恐怖袭击预测
L. Hong
Abstract. Due to the different national conditions, the driving forces and factors of national terrorist attacks vary. Therefore, this paper takes GTD China sample data as the research object to study and predict. The prediction process is as follows: On the basis of the BP network-based model for predicting the most dangerous areas, combined with the GTD sample data, the best number of nodes in the implicit layer of the prediction model is automatically selected by combining the empirical formula with the MATLAB program. Three improved BP algorithms are used to train the network model. The results show that the training error of Levenburg Marquardt algorithm is minimal and the convergence speed is fastest. Through the training and simulation of the model, it is proved that the model has high precision and can meet the requirement of practical application.
摘要由于国情不同,国家恐怖袭击的动因和因素也不同。因此,本文以GTD中国样本数据为研究对象进行研究和预测。预测过程如下:在基于BP网络的最危险区域预测模型的基础上,结合GTD样本数据,结合经验公式和MATLAB程序,自动选择预测模型隐含层的最佳节点数。采用三种改进的BP算法对网络模型进行训练。结果表明,Levenburg Marquardt算法的训练误差最小,收敛速度最快。通过对模型的训练和仿真,证明该模型具有较高的精度,能够满足实际应用的要求。
{"title":"Prediction of Terrorist Attacks in China based on BP improved Algorithm and GTD","authors":"L. Hong","doi":"10.2991/ICMEIT-19.2019.65","DOIUrl":"https://doi.org/10.2991/ICMEIT-19.2019.65","url":null,"abstract":"Abstract. Due to the different national conditions, the driving forces and factors of national terrorist attacks vary. Therefore, this paper takes GTD China sample data as the research object to study and predict. The prediction process is as follows: On the basis of the BP network-based model for predicting the most dangerous areas, combined with the GTD sample data, the best number of nodes in the implicit layer of the prediction model is automatically selected by combining the empirical formula with the MATLAB program. Three improved BP algorithms are used to train the network model. The results show that the training error of Levenburg Marquardt algorithm is minimal and the convergence speed is fastest. Through the training and simulation of the model, it is proved that the model has high precision and can meet the requirement of practical application.","PeriodicalId":223458,"journal":{"name":"Proceedings of the 3rd International Conference on Mechatronics Engineering and Information Technology (ICMEIT 2019)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124267089","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design and Simulation of Conformal Phased Array Antenna 共形相控阵天线的设计与仿真
Zhihui Hu, Xiao-Lan Tang, Chengyan Lu, Jun Zhang
Antenna is the main energy converter of radar seeker. It converts the transmitted signal into space radiation field, and converts the echo signal reflected by the target into guided wave field and sends it to the receiver. Therefore, antenna design plays an important role in the design of radar seeker. The development of radar seeker antenna mainly includes cone-scan antenna, monopulse parabolic antenna and waveguide slot array antenna. Although this kind of antenna can search and track the target, its scanning mode is mechanical scanning, which needs precise servo system to complete. Therefore, its angle scanning range is small, tracking speed is slow and volume is large. Phased array antenna has the advantages of fast beam scanning speed, flexible control and strong anti-jamming performance because it uses electronic scanning instead of mechanical scanning. At present, the phased array antenna is mainly planar array antenna. Its design technology is relatively mature, but there are some shortcomings. Its beam scanning range is narrow, beam width and sidelobe level will increase with the increase of scanning angle, and array gain will decrease with the increase of scanning angle. In order to fully satisfy the design requirements of the moving platform, the radiation units of the phased array antenna are installed on the surface of the moving platform to make it coincide with the surface of the moving platform. A conformal phased array antenna can be formed, where the moving platform can be a carrier of aircraft, missiles, ships and so on. Conformal phased array antenna is the combination of conformal array and phased array, so it can overcome the shortcomings of planar antenna, realize beam scanning with wide angle and wide range, and keep the antenna gain and beam shape unchanged during scanning. It can also improve the aerodynamic performance of carrier and reduce the cross-section area of radar. Therefore, conformal phased array antenna has become a new important development direction of radar antenna technology.
天线是雷达导引头的主要能量转换器。它将发射信号转换成空间辐射场,再将目标反射的回波信号转换成导波场送至接收机。因此,天线设计在雷达导引头的设计中起着重要的作用。雷达导引头天线的发展主要包括锥扫描天线、单脉冲抛物面天线和波导缝隙阵列天线。这种天线虽然可以对目标进行搜索和跟踪,但其扫描方式为机械扫描,需要精密的伺服系统来完成。因此,其角度扫描范围小,跟踪速度慢,体积大。相控阵天线采用电子扫描代替机械扫描,具有波束扫描速度快、控制灵活、抗干扰性能强等优点。目前,相控阵天线主要是平面阵天线。其设计技术相对成熟,但也存在一些不足。其波束扫描范围窄,波束宽度和旁瓣电平随扫描角的增大而增大,阵列增益随扫描角的增大而减小。为了充分满足移动平台的设计要求,将相控阵天线的辐射单元安装在移动平台的表面,使其与移动平台的表面重合。可以形成共形相控阵天线,其中的移动平台可以是飞机、导弹、舰船等的载体。共形相控阵天线是共形阵与相控阵的结合,可以克服平面天线的缺点,实现广角、宽范围的波束扫描,并且在扫描过程中保持天线增益和波束形状不变。它还可以提高舰载机的气动性能,减小雷达的截面积。因此,共形相控阵天线已成为雷达天线技术新的重要发展方向。
{"title":"Design and Simulation of Conformal Phased Array Antenna","authors":"Zhihui Hu, Xiao-Lan Tang, Chengyan Lu, Jun Zhang","doi":"10.2991/ICMEIT-19.2019.136","DOIUrl":"https://doi.org/10.2991/ICMEIT-19.2019.136","url":null,"abstract":"Antenna is the main energy converter of radar seeker. It converts the transmitted signal into space radiation field, and converts the echo signal reflected by the target into guided wave field and sends it to the receiver. Therefore, antenna design plays an important role in the design of radar seeker. The development of radar seeker antenna mainly includes cone-scan antenna, monopulse parabolic antenna and waveguide slot array antenna. Although this kind of antenna can search and track the target, its scanning mode is mechanical scanning, which needs precise servo system to complete. Therefore, its angle scanning range is small, tracking speed is slow and volume is large. Phased array antenna has the advantages of fast beam scanning speed, flexible control and strong anti-jamming performance because it uses electronic scanning instead of mechanical scanning. At present, the phased array antenna is mainly planar array antenna. Its design technology is relatively mature, but there are some shortcomings. Its beam scanning range is narrow, beam width and sidelobe level will increase with the increase of scanning angle, and array gain will decrease with the increase of scanning angle. In order to fully satisfy the design requirements of the moving platform, the radiation units of the phased array antenna are installed on the surface of the moving platform to make it coincide with the surface of the moving platform. A conformal phased array antenna can be formed, where the moving platform can be a carrier of aircraft, missiles, ships and so on. Conformal phased array antenna is the combination of conformal array and phased array, so it can overcome the shortcomings of planar antenna, realize beam scanning with wide angle and wide range, and keep the antenna gain and beam shape unchanged during scanning. It can also improve the aerodynamic performance of carrier and reduce the cross-section area of radar. Therefore, conformal phased array antenna has become a new important development direction of radar antenna technology.","PeriodicalId":223458,"journal":{"name":"Proceedings of the 3rd International Conference on Mechatronics Engineering and Information Technology (ICMEIT 2019)","volume":"418 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115926320","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Feature Selection and Deep Learning based Approach for Network Intrusion Detection 基于特征选择和深度学习的网络入侵检测方法
Jie Ling, Chen-He Wu
The intrusion detection system deals with huge amount of data containing redundant and noisy features and the poor classifier algorithm causing the degradation of detection accuracy, in this paper, we introduce the random forest feature selection algorithm and propose a method that multi-classifier ensemble based on deep learning for intrusion detection. It used the random forest feature selection algorithm to extract optimal feature subset that are used to train by support vector machine, decision tree, naïve bayes and k-nearest neighbor classification algorithm, then, applying the deep learning to stack the output of four classifiers. The experimental results show that the proposed method can effectively improve the accuracy of intrusion detection compared with the majoring voting algorithm.
针对入侵检测系统中存在大量包含冗余和噪声特征的数据,以及分类器算法较差导致检测精度下降的问题,本文引入随机森林特征选择算法,提出了一种基于深度学习的多分类器集成入侵检测方法。使用随机森林特征选择算法提取最优特征子集,并通过支持向量机、决策树、naïve贝叶斯和k近邻分类算法进行训练,然后应用深度学习对四个分类器的输出进行叠加。实验结果表明,与主流投票算法相比,该方法能有效提高入侵检测的准确率。
{"title":"Feature Selection and Deep Learning based Approach for Network Intrusion Detection","authors":"Jie Ling, Chen-He Wu","doi":"10.2991/ICMEIT-19.2019.122","DOIUrl":"https://doi.org/10.2991/ICMEIT-19.2019.122","url":null,"abstract":"The intrusion detection system deals with huge amount of data containing redundant and noisy features and the poor classifier algorithm causing the degradation of detection accuracy, in this paper, we introduce the random forest feature selection algorithm and propose a method that multi-classifier ensemble based on deep learning for intrusion detection. It used the random forest feature selection algorithm to extract optimal feature subset that are used to train by support vector machine, decision tree, naïve bayes and k-nearest neighbor classification algorithm, then, applying the deep learning to stack the output of four classifiers. The experimental results show that the proposed method can effectively improve the accuracy of intrusion detection compared with the majoring voting algorithm.","PeriodicalId":223458,"journal":{"name":"Proceedings of the 3rd International Conference on Mechatronics Engineering and Information Technology (ICMEIT 2019)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121924038","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
期刊
Proceedings of the 3rd International Conference on Mechatronics Engineering and Information Technology (ICMEIT 2019)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1