Pub Date : 2019-08-01DOI: 10.1109/CCET48361.2019.8989074
Yunting Wang, Xiao Peng, Xiaoyong Liu, Peichuan Kang
TETRA (Terrestrial Trunked Radio) digital trunk system is widely used in civil aviation mobile communications, which can effectively provide protection for the airport ground communication scheduling, especially to ensure the communication between different departments of the airport. However, the existing spectrum resources of the TETRA frequency can no longer meet the demand of the sharply increasing transportation. It is necessary to study the idle frequency suitable for the allocation to the Civil Aviation Mobile Communication in the 806-821MHz and 851-866MHz digital cluster spectrum from the perspective of electromagnetic compatibility numerical calculation. This paper firstly investigates the frequency usage of the TETRA digital trunk system in the airport, and then designs reasonable interference calculation method for the first adjacent channel and the non-first adjacent channel based on TETRA system parameters and interference protection criteria, then calculates the coexistence conditions, isolation and isolation distance of the existing TETRA system and the idle channel TETRA system by using the above methods. Finally, based on the above research results, the recommendations for the idle frequency selection of the digital trunk service are provided.
{"title":"Research on Electromagnetic Compatibility Analysis of TETRA Digital Trunk System in Civil Aviation Mobile Communication","authors":"Yunting Wang, Xiao Peng, Xiaoyong Liu, Peichuan Kang","doi":"10.1109/CCET48361.2019.8989074","DOIUrl":"https://doi.org/10.1109/CCET48361.2019.8989074","url":null,"abstract":"TETRA (Terrestrial Trunked Radio) digital trunk system is widely used in civil aviation mobile communications, which can effectively provide protection for the airport ground communication scheduling, especially to ensure the communication between different departments of the airport. However, the existing spectrum resources of the TETRA frequency can no longer meet the demand of the sharply increasing transportation. It is necessary to study the idle frequency suitable for the allocation to the Civil Aviation Mobile Communication in the 806-821MHz and 851-866MHz digital cluster spectrum from the perspective of electromagnetic compatibility numerical calculation. This paper firstly investigates the frequency usage of the TETRA digital trunk system in the airport, and then designs reasonable interference calculation method for the first adjacent channel and the non-first adjacent channel based on TETRA system parameters and interference protection criteria, then calculates the coexistence conditions, isolation and isolation distance of the existing TETRA system and the idle channel TETRA system by using the above methods. Finally, based on the above research results, the recommendations for the idle frequency selection of the digital trunk service are provided.","PeriodicalId":231425,"journal":{"name":"2019 IEEE 2nd International Conference on Computer and Communication Engineering Technology (CCET)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126758146","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-08-01DOI: 10.1109/ccet48361.2019.8989185
{"title":"CCET 2019 Title Page","authors":"","doi":"10.1109/ccet48361.2019.8989185","DOIUrl":"https://doi.org/10.1109/ccet48361.2019.8989185","url":null,"abstract":"","PeriodicalId":231425,"journal":{"name":"2019 IEEE 2nd International Conference on Computer and Communication Engineering Technology (CCET)","volume":"244 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116390647","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-08-01DOI: 10.1109/CCET48361.2019.8989385
Shengbing Ren, Xiang Zhang
The problem of synthesizing adequate inductive invariants lies at the heart of automated software verification. With the rapid development of artificial intelligence, the state- of-the-art machine learning algorithms for invariants synthesis have gradually been developed and have shown its excellent performance. However, when positive samples are distributed among multiple clusters, the algorithm for intersection of half space based on SVM can not generate the candidate invariants. In order to solve this problem, a new modified algorithm, based on and k-means++ and SVM, is proposed. After sampling, our algorithm adopts k-means++ to cluster the positive samples. Then this algorithm uses SVM to distinguish each positive sample cluster from all negative samples to compute the candidate invariants. Finally, a set of theories founded on Hoare logic are adopted to check whether the candidate invariants are true invariants. If the check succeeds, the true invariants have been found. Otherwise, we should collect more samples and repeat our algorithm. Experimental results show that our algorithm can compute the candidate invariants when positive samples are distributed among multiple clusters.
{"title":"Synthesize Inductive Invariants by K-means++ and Support Vector Machine","authors":"Shengbing Ren, Xiang Zhang","doi":"10.1109/CCET48361.2019.8989385","DOIUrl":"https://doi.org/10.1109/CCET48361.2019.8989385","url":null,"abstract":"The problem of synthesizing adequate inductive invariants lies at the heart of automated software verification. With the rapid development of artificial intelligence, the state- of-the-art machine learning algorithms for invariants synthesis have gradually been developed and have shown its excellent performance. However, when positive samples are distributed among multiple clusters, the algorithm for intersection of half space based on SVM can not generate the candidate invariants. In order to solve this problem, a new modified algorithm, based on and k-means++ and SVM, is proposed. After sampling, our algorithm adopts k-means++ to cluster the positive samples. Then this algorithm uses SVM to distinguish each positive sample cluster from all negative samples to compute the candidate invariants. Finally, a set of theories founded on Hoare logic are adopted to check whether the candidate invariants are true invariants. If the check succeeds, the true invariants have been found. Otherwise, we should collect more samples and repeat our algorithm. Experimental results show that our algorithm can compute the candidate invariants when positive samples are distributed among multiple clusters.","PeriodicalId":231425,"journal":{"name":"2019 IEEE 2nd International Conference on Computer and Communication Engineering Technology (CCET)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124107728","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-08-01DOI: 10.1109/CCET48361.2019.8989301
Wang Yingshu, Yan Kai
Agile development is very important to modern IT application. The application testing mode can’t cover the impact of the network when the application version is updated because the complexity. Using SDN theory and emulating virtualization technologies this paper proposed a method to deploy a emulated network environment to clone a production network architecture in a digital space just in 10 minutes. The method can extend the agile testing capability into network area for the first time. The method takes full advantage of SDN to uncouple the controlling and forwarding plane, support the fast change in networking and realize the agile tested network environment.
{"title":"The Design and Implementation about Agile Testing for Software Networking Environment based on SDN and Emulating Virtualization Technologies","authors":"Wang Yingshu, Yan Kai","doi":"10.1109/CCET48361.2019.8989301","DOIUrl":"https://doi.org/10.1109/CCET48361.2019.8989301","url":null,"abstract":"Agile development is very important to modern IT application. The application testing mode can’t cover the impact of the network when the application version is updated because the complexity. Using SDN theory and emulating virtualization technologies this paper proposed a method to deploy a emulated network environment to clone a production network architecture in a digital space just in 10 minutes. The method can extend the agile testing capability into network area for the first time. The method takes full advantage of SDN to uncouple the controlling and forwarding plane, support the fast change in networking and realize the agile tested network environment.","PeriodicalId":231425,"journal":{"name":"2019 IEEE 2nd International Conference on Computer and Communication Engineering Technology (CCET)","volume":"103 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132920213","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-08-01DOI: 10.1109/CCET48361.2019.8989358
Li Han, Liu-Yang Chen, Y. Bin, Dong Cun, Yu-chen Hao, Jin Xin
As a new energy resource, wind power receives more and more attentions, and wind power prediction has become an important means to guarantee the normal operation of power grids. To get more accurate predicted results, a wind power prediction method based on deep feature combination and model fusion is proposed in this paper. Firstly, the feature selection method is applied to find important features. Secondly, the tree-based ensemble learning model XGBoost and LightGBM are adopted to construct high-dimensional combination features in parallel, and PCA is used to reduce the dimension of the high-dimensional combination features. Finally, the wind power is predicted by using the model fusion method. The wind power data of four different regions are used as the experimental data set. The experimental result shows that the accuracy of the proposed method is significantly improved compared with the single model methods and the common model integration methods.
{"title":"Deep Feature Combination Based Multi-Model Wind Power Prediction","authors":"Li Han, Liu-Yang Chen, Y. Bin, Dong Cun, Yu-chen Hao, Jin Xin","doi":"10.1109/CCET48361.2019.8989358","DOIUrl":"https://doi.org/10.1109/CCET48361.2019.8989358","url":null,"abstract":"As a new energy resource, wind power receives more and more attentions, and wind power prediction has become an important means to guarantee the normal operation of power grids. To get more accurate predicted results, a wind power prediction method based on deep feature combination and model fusion is proposed in this paper. Firstly, the feature selection method is applied to find important features. Secondly, the tree-based ensemble learning model XGBoost and LightGBM are adopted to construct high-dimensional combination features in parallel, and PCA is used to reduce the dimension of the high-dimensional combination features. Finally, the wind power is predicted by using the model fusion method. The wind power data of four different regions are used as the experimental data set. The experimental result shows that the accuracy of the proposed method is significantly improved compared with the single model methods and the common model integration methods.","PeriodicalId":231425,"journal":{"name":"2019 IEEE 2nd International Conference on Computer and Communication Engineering Technology (CCET)","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133464979","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The sorting accuracy of the radar emitter signal-sorting algorithm is reduced in a complex electromagnetic environment. In view of this problem, we proposed an envelope extraction algorithm for amplitude sorting of radar emitter signals in this paper. On the basis of the variation characteristics of pulse amplitude (PA), the envelope extraction algorithm is designed for PA by segmented Hermitian interpolation and amplitude difference algorithm. This algorithm achieves the sorting of radar emitter signals in the case of severe aliasing. From the simulation results, it can effectively process aliasing radar source signals with false and missing pulses, which enables a high accuracy in different situations. The algorithm provides a new and convenient method for radar emitter signal-sorting.
{"title":"Envelope Extraction Algorithm for Amplitude Sorting of Radar Emitter Signals","authors":"Wenting Yang, Chunxu Li, Zhuojun Xu, Chengzhi Yang, Hangwei Hu, Yantao Tian","doi":"10.1109/CCET48361.2019.8989300","DOIUrl":"https://doi.org/10.1109/CCET48361.2019.8989300","url":null,"abstract":"The sorting accuracy of the radar emitter signal-sorting algorithm is reduced in a complex electromagnetic environment. In view of this problem, we proposed an envelope extraction algorithm for amplitude sorting of radar emitter signals in this paper. On the basis of the variation characteristics of pulse amplitude (PA), the envelope extraction algorithm is designed for PA by segmented Hermitian interpolation and amplitude difference algorithm. This algorithm achieves the sorting of radar emitter signals in the case of severe aliasing. From the simulation results, it can effectively process aliasing radar source signals with false and missing pulses, which enables a high accuracy in different situations. The algorithm provides a new and convenient method for radar emitter signal-sorting.","PeriodicalId":231425,"journal":{"name":"2019 IEEE 2nd International Conference on Computer and Communication Engineering Technology (CCET)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130523462","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-08-01DOI: 10.1109/CCET48361.2019.8989392
Yang Jian, Su Peng, Zhenpeng Li
Most of the languages in the Sino-Tibetan language family use syllables as the basic unit of speech recognition. Recently most methods of syllable segmentation extract the features of speech signals as the basis of segmentation, and some predefined thresholds are introduced to determine the boundaries. Considering that the location of a syllable boundary is not only related to its previous speech signal sequence, but also to its later speech signals, a blind syllable segmentation method based on bi-directional recurrent neural network (BRNN) is proposed, in which the pure speech signals are used as original input. In order to alleviate the gradient vanishing problem, Long Short-Term Memory (LSTM) is used as the basic neuron unit in the BRNN model. In order to calculate the loss of the model efficiently, a linear distance factor and an auxiliary label vector are introduced. The two vectors are only related to the speech signals, and can be calculated at the same time as the training set is generated. With the help of these two vectors, a loss function based on cross-entropy is designed, and the model is trained and evaluated under the speech data with a total length of 2.8 hours coming from a Bai Language speech corpora. The experimental results show that the proposed model based on bi-directional LSTM (BiLSTM) can be effectively applied to syllable segmentation without additional threshold parameters, and the detection accuracy of syllable boundaries is close to 85% with the evaluating dataset.
{"title":"An Automatic Blind Syllable Segmentation Model Based on Bi-directional LSTM","authors":"Yang Jian, Su Peng, Zhenpeng Li","doi":"10.1109/CCET48361.2019.8989392","DOIUrl":"https://doi.org/10.1109/CCET48361.2019.8989392","url":null,"abstract":"Most of the languages in the Sino-Tibetan language family use syllables as the basic unit of speech recognition. Recently most methods of syllable segmentation extract the features of speech signals as the basis of segmentation, and some predefined thresholds are introduced to determine the boundaries. Considering that the location of a syllable boundary is not only related to its previous speech signal sequence, but also to its later speech signals, a blind syllable segmentation method based on bi-directional recurrent neural network (BRNN) is proposed, in which the pure speech signals are used as original input. In order to alleviate the gradient vanishing problem, Long Short-Term Memory (LSTM) is used as the basic neuron unit in the BRNN model. In order to calculate the loss of the model efficiently, a linear distance factor and an auxiliary label vector are introduced. The two vectors are only related to the speech signals, and can be calculated at the same time as the training set is generated. With the help of these two vectors, a loss function based on cross-entropy is designed, and the model is trained and evaluated under the speech data with a total length of 2.8 hours coming from a Bai Language speech corpora. The experimental results show that the proposed model based on bi-directional LSTM (BiLSTM) can be effectively applied to syllable segmentation without additional threshold parameters, and the detection accuracy of syllable boundaries is close to 85% with the evaluating dataset.","PeriodicalId":231425,"journal":{"name":"2019 IEEE 2nd International Conference on Computer and Communication Engineering Technology (CCET)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114728578","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-08-01DOI: 10.1109/CCET48361.2019.8989055
Jinhong Li, Lu Wei, Lei Gao, Jian Yang
Compared with traditional fixed traffic detection, intelligent connected vehicle (CV) brings a new spatial- temporal data environment for urban traffic signal control. However how to evaluate traffic control approaches based on connected vehicle data, especially in different penetration rates environment has been a great difficulty. This paper proposes a simulation framework that incorporates real-world traffic signal controller, system and traffic simulation software, VISSIM. Different penetration rates of connected vehicles could be modeled in VISSIM. We also development a data communication unit (DCU) to exchange real-time information between virtual road networks and real-world traffic signal controller or system via a protocol that we designed. With this simulation framework, researchers could evaluate new traffic signal control strategies based on connected vehicle data, or even multi-source data fusion. Finally, an exemplary traffic control optimization scenario based on CV trajectory data is given to demonstrate the practicability of the simulation framework.
{"title":"A Simulation Framework for Traffic Signal Control under Connected Vehicle Data Environment","authors":"Jinhong Li, Lu Wei, Lei Gao, Jian Yang","doi":"10.1109/CCET48361.2019.8989055","DOIUrl":"https://doi.org/10.1109/CCET48361.2019.8989055","url":null,"abstract":"Compared with traditional fixed traffic detection, intelligent connected vehicle (CV) brings a new spatial- temporal data environment for urban traffic signal control. However how to evaluate traffic control approaches based on connected vehicle data, especially in different penetration rates environment has been a great difficulty. This paper proposes a simulation framework that incorporates real-world traffic signal controller, system and traffic simulation software, VISSIM. Different penetration rates of connected vehicles could be modeled in VISSIM. We also development a data communication unit (DCU) to exchange real-time information between virtual road networks and real-world traffic signal controller or system via a protocol that we designed. With this simulation framework, researchers could evaluate new traffic signal control strategies based on connected vehicle data, or even multi-source data fusion. Finally, an exemplary traffic control optimization scenario based on CV trajectory data is given to demonstrate the practicability of the simulation framework.","PeriodicalId":231425,"journal":{"name":"2019 IEEE 2nd International Conference on Computer and Communication Engineering Technology (CCET)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129385191","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-08-01DOI: 10.1109/CCET48361.2019.8989235
Hongge Wei, Zhengjun Li
Based on the experimental verification, this paper analyses the changes of antenna gain, sidelobe level, edge coverage gain and aperture efficiency when the taper level of the feed horn changes, and puts forward a range of optimal taper level. By introducing the concept of spatial attenuation of reflector antenna, a more accurate method to determine the taper level is given. Based on the value of the tapered level, it can provide quite favorable reference for different types of reflector characteristics in future design work.
{"title":"Analysis of the Reflector Antenna’s Feed Taper Level","authors":"Hongge Wei, Zhengjun Li","doi":"10.1109/CCET48361.2019.8989235","DOIUrl":"https://doi.org/10.1109/CCET48361.2019.8989235","url":null,"abstract":"Based on the experimental verification, this paper analyses the changes of antenna gain, sidelobe level, edge coverage gain and aperture efficiency when the taper level of the feed horn changes, and puts forward a range of optimal taper level. By introducing the concept of spatial attenuation of reflector antenna, a more accurate method to determine the taper level is given. Based on the value of the tapered level, it can provide quite favorable reference for different types of reflector characteristics in future design work.","PeriodicalId":231425,"journal":{"name":"2019 IEEE 2nd International Conference on Computer and Communication Engineering Technology (CCET)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123504775","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A vision-based online calibration system for linear measuring tools is introduced in this paper. It includes sensors, light sources, detection software, etc, comprehensively analyses the factors leading to instability of the system, explores the mechanism of instability factors of the system, and puts forward scientific and reliable detection methods. These factors are considered comprehensively to optimize the vision system, in order to establish a stable and qualified machine vision inspection system. Aiming at the distortion error caused by lens, a method of correcting the original distortion image is introduced in this paper by establishing a model based on grid correction method and calculating distortion parameters.
{"title":"Instability Factor Analysis of the Vision-based Online Calibration System For Linear Measuring Tools","authors":"Yingsong Chen, Huijie Zhang, Yufang Yin, Lihong Wu","doi":"10.1109/CCET48361.2019.8989390","DOIUrl":"https://doi.org/10.1109/CCET48361.2019.8989390","url":null,"abstract":"A vision-based online calibration system for linear measuring tools is introduced in this paper. It includes sensors, light sources, detection software, etc, comprehensively analyses the factors leading to instability of the system, explores the mechanism of instability factors of the system, and puts forward scientific and reliable detection methods. These factors are considered comprehensively to optimize the vision system, in order to establish a stable and qualified machine vision inspection system. Aiming at the distortion error caused by lens, a method of correcting the original distortion image is introduced in this paper by establishing a model based on grid correction method and calculating distortion parameters.","PeriodicalId":231425,"journal":{"name":"2019 IEEE 2nd International Conference on Computer and Communication Engineering Technology (CCET)","volume":"42 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114133769","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}