Pub Date : 2020-08-01DOI: 10.1109/ISCEIC51027.2020.00022
Yanchang Han, Guiling Zhu, Xiaofei Hu
In this paper, some new fixed point results for a contractive mapping in cone b -metric spaces over Banach algebras are obtained, which extend the condition of $rho (alpha + beta) in big[0,displaystylefrac{1}{s}big)(s ge 1)$ to ρ (α + β )∈[0,1) (ρ (x) is the spectral radius of x ). Moreover, some similar improvements in cone b-metric spaces and b-metric spaces are also obtained, which from $(alpha + beta) in big[0,displaystylefrac{1}{s}big)(s ge 1)$ to (α + β )∈[0,1). There are some examples that are given to support the results.
本文得到了Banach代数上锥b -度量空间中压缩映射的一些新的不动点结果,将$rho (alpha + beta) in big[0,displaystylefrac{1}{s}big)(s ge 1)$的条件推广到ρ (α + β)∈[0,1](ρ (x)是x的谱半径)。此外,在锥型b-度量空间和b-度量空间中也得到了一些类似的改进,从$(alpha + beta) in big[0,displaystylefrac{1}{s}big)(s ge 1)$到(α + β)∈[0,1]。给出了一些例子来支持结果。
{"title":"Some results in cone b -metric spaces over Banach algebras","authors":"Yanchang Han, Guiling Zhu, Xiaofei Hu","doi":"10.1109/ISCEIC51027.2020.00022","DOIUrl":"https://doi.org/10.1109/ISCEIC51027.2020.00022","url":null,"abstract":"In this paper, some new fixed point results for a contractive mapping in cone b -metric spaces over Banach algebras are obtained, which extend the condition of $rho (alpha + beta) in big[0,displaystylefrac{1}{s}big)(s ge 1)$ to ρ (α + β )∈[0,1) (ρ (x) is the spectral radius of x ). Moreover, some similar improvements in cone b-metric spaces and b-metric spaces are also obtained, which from $(alpha + beta) in big[0,displaystylefrac{1}{s}big)(s ge 1)$ to (α + β )∈[0,1). There are some examples that are given to support the results.","PeriodicalId":249521,"journal":{"name":"2020 International Symposium on Computer Engineering and Intelligent Communications (ISCEIC)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126758279","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-08-01DOI: 10.1109/isceic51027.2020.00012
Xiwen Liu, Jia Li, Zhuohong Yao, Chi Zhou, Yunpeng Diao
There are more and more applications in the industrial market with the continuous development of network technology in recent years. In this paper we use the database technology and network technology to design a heating data management system based on B/S mode. This system enables the staff view the real-time data of each heating station through the network anytime and anywhere. This system consists of three parts: client, database and server. We use Visual Studio 2010 to develop this project which uses asp.net framework and ado.net technology to access the database.
近年来,随着网络技术的不断发展,在工业市场上的应用越来越多。本文利用数据库技术和网络技术,设计了一个基于B/S模式的供热数据管理系统。该系统使工作人员可以随时随地通过网络查看各个供热站的实时数据。本系统由客户端、数据库和服务器三部分组成。本项目使用Visual Studio 2010开发,使用asp.net框架和ado.net技术访问数据库。
{"title":"A heating data management system based on B/S mode","authors":"Xiwen Liu, Jia Li, Zhuohong Yao, Chi Zhou, Yunpeng Diao","doi":"10.1109/isceic51027.2020.00012","DOIUrl":"https://doi.org/10.1109/isceic51027.2020.00012","url":null,"abstract":"There are more and more applications in the industrial market with the continuous development of network technology in recent years. In this paper we use the database technology and network technology to design a heating data management system based on B/S mode. This system enables the staff view the real-time data of each heating station through the network anytime and anywhere. This system consists of three parts: client, database and server. We use Visual Studio 2010 to develop this project which uses asp.net framework and ado.net technology to access the database.","PeriodicalId":249521,"journal":{"name":"2020 International Symposium on Computer Engineering and Intelligent Communications (ISCEIC)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121834707","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Engineering vehicles on construction sites mainly include excavators, wheeled cranes and so on. If the engineering vehicle is working under or near the high-voltage power line, its bucket or boom probably enter the high-voltage breakdown range when they are lifted, which is very easy to result in accidents such as short circuit breakdown. So, it is necessary to find out the engineering vehicles working near high-voltage power line during inspection. Unmanned aerial vehicle (UAV) inspection is one of the main methods of electric power inspection at present. Lots of images are produced by UAV during the power line inspection. It will save a lot of inspection work if the engineering vehicles working near high-voltage power line can be recognized from these images. First, this paper analyzes the specific requirements of engineering vehicle recognition from aerial images of UAV power line inspection. Then, based on the research status of vehicle recognition in aerial images and other related fields at domestic and abroad, this paper comprehensively analyzes the research status of classical pattern recognition method and deep neural network method to recognize engineering vehicles in aerial images of UAV. Third, in view of the practical problems such as the low aerial image data of engineering vehicles, the roadmap of recognizing the engineering vehicles in the aerial image of UAV using the capsule network method is designed.
{"title":"A Roadmap for Recognizing Engineering Vehicle from Aerial Images of UAV","authors":"Haiyang Zheng, Yingchun Zhong, Lifang Lin, Zhiyong Luo, Huiqing He, Guohao Deng","doi":"10.1109/ISCEIC51027.2020.00019","DOIUrl":"https://doi.org/10.1109/ISCEIC51027.2020.00019","url":null,"abstract":"Engineering vehicles on construction sites mainly include excavators, wheeled cranes and so on. If the engineering vehicle is working under or near the high-voltage power line, its bucket or boom probably enter the high-voltage breakdown range when they are lifted, which is very easy to result in accidents such as short circuit breakdown. So, it is necessary to find out the engineering vehicles working near high-voltage power line during inspection. Unmanned aerial vehicle (UAV) inspection is one of the main methods of electric power inspection at present. Lots of images are produced by UAV during the power line inspection. It will save a lot of inspection work if the engineering vehicles working near high-voltage power line can be recognized from these images. First, this paper analyzes the specific requirements of engineering vehicle recognition from aerial images of UAV power line inspection. Then, based on the research status of vehicle recognition in aerial images and other related fields at domestic and abroad, this paper comprehensively analyzes the research status of classical pattern recognition method and deep neural network method to recognize engineering vehicles in aerial images of UAV. Third, in view of the practical problems such as the low aerial image data of engineering vehicles, the roadmap of recognizing the engineering vehicles in the aerial image of UAV using the capsule network method is designed.","PeriodicalId":249521,"journal":{"name":"2020 International Symposium on Computer Engineering and Intelligent Communications (ISCEIC)","volume":"96 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122533752","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-08-01DOI: 10.1109/isceic51027.2020.00020
Liang Shuang
In this paper, we present a new method for sparse representation of rational function in Hardy-2 space by using Iteratively Reweighted Least Squares (IRLS) algorithm and shifted Cauchy kernels. This problem originates from identification of transfer functions of FIR models. We also give two examples and MATLAB codes to illustrate the idea.
{"title":"Sparse Representation of Hardy Function by Iteratively Reweighted Least Squares","authors":"Liang Shuang","doi":"10.1109/isceic51027.2020.00020","DOIUrl":"https://doi.org/10.1109/isceic51027.2020.00020","url":null,"abstract":"In this paper, we present a new method for sparse representation of rational function in Hardy-2 space by using Iteratively Reweighted Least Squares (IRLS) algorithm and shifted Cauchy kernels. This problem originates from identification of transfer functions of FIR models. We also give two examples and MATLAB codes to illustrate the idea.","PeriodicalId":249521,"journal":{"name":"2020 International Symposium on Computer Engineering and Intelligent Communications (ISCEIC)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131612985","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-08-01DOI: 10.1109/ISCEIC51027.2020.00023
Shen Jie, Zhan Jian
The emergence of distributed real-time database provides a convenient and unified data storage method for ship monitoring and control software. Based on the distributed real-time database developed by ourselves, aiming at the application demand of ship monitoring and control system to distributed real-time database, combining the self defined protocol with the distributed real-time database, this paper proposes a data synchronization method of the distributed real-time database. It effectively solves the problem of data synchronization of distributed real-time database, and constructs a fully peer-to-peer distributed real-time database.
{"title":"Research On Synchronization Technology Of Peer-to-peer Distributed Real-time Database Based On Ship Platform","authors":"Shen Jie, Zhan Jian","doi":"10.1109/ISCEIC51027.2020.00023","DOIUrl":"https://doi.org/10.1109/ISCEIC51027.2020.00023","url":null,"abstract":"The emergence of distributed real-time database provides a convenient and unified data storage method for ship monitoring and control software. Based on the distributed real-time database developed by ourselves, aiming at the application demand of ship monitoring and control system to distributed real-time database, combining the self defined protocol with the distributed real-time database, this paper proposes a data synchronization method of the distributed real-time database. It effectively solves the problem of data synchronization of distributed real-time database, and constructs a fully peer-to-peer distributed real-time database.","PeriodicalId":249521,"journal":{"name":"2020 International Symposium on Computer Engineering and Intelligent Communications (ISCEIC)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126015392","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-08-01DOI: 10.1109/isceic51027.2020.00024
Ziqi Wang, Jun Xie, Yang Wang, Mingjian Fan, Yingying Wang, Jihang Han
Steady-state current and impulse current are important indicators for judging the feasibility of loop closing operations. Nevertheless, only these two indicators are unable to offer the information for changes in power grid before and after the operation as well as guiding suggestions to operators. By using a multi-dimensional index system, a more comprehensive judgment for the feasibility of loop closing is provided from three dimensions: static assessment, transient assessment and hybrid assessment. These not only cover such important evaluation indicators as steady-state current and impulse current, but also include the changes of power flow, the limits of N-1 and the trend of current or voltage. The simulation of loop closing in EPRI-36 bus system verifies the correctness and effectiveness of multi-dimensional index system, which provides a reliable basis for the security and stability of power grid.
{"title":"Analytical of Loop closing Operation Based on Multi-dimensional Index System","authors":"Ziqi Wang, Jun Xie, Yang Wang, Mingjian Fan, Yingying Wang, Jihang Han","doi":"10.1109/isceic51027.2020.00024","DOIUrl":"https://doi.org/10.1109/isceic51027.2020.00024","url":null,"abstract":"Steady-state current and impulse current are important indicators for judging the feasibility of loop closing operations. Nevertheless, only these two indicators are unable to offer the information for changes in power grid before and after the operation as well as guiding suggestions to operators. By using a multi-dimensional index system, a more comprehensive judgment for the feasibility of loop closing is provided from three dimensions: static assessment, transient assessment and hybrid assessment. These not only cover such important evaluation indicators as steady-state current and impulse current, but also include the changes of power flow, the limits of N-1 and the trend of current or voltage. The simulation of loop closing in EPRI-36 bus system verifies the correctness and effectiveness of multi-dimensional index system, which provides a reliable basis for the security and stability of power grid.","PeriodicalId":249521,"journal":{"name":"2020 International Symposium on Computer Engineering and Intelligent Communications (ISCEIC)","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114683802","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-08-01DOI: 10.1109/ISCEIC51027.2020.00037
L. Tang
Based on the existing image and video watermarking algorithms, this paper proposes a new digital video watermarking algorithm based on DCT domain. The basic idea of this algorithm is to use the difference between two DCT coefficients in the DCT domain to embed watermark information in consecutive frames of the original video. The simulation experiment results show that the algorithm has better invisibility.
{"title":"Research on Digital Video Watermarking Algorithm Based on DCT Domain","authors":"L. Tang","doi":"10.1109/ISCEIC51027.2020.00037","DOIUrl":"https://doi.org/10.1109/ISCEIC51027.2020.00037","url":null,"abstract":"Based on the existing image and video watermarking algorithms, this paper proposes a new digital video watermarking algorithm based on DCT domain. The basic idea of this algorithm is to use the difference between two DCT coefficients in the DCT domain to embed watermark information in consecutive frames of the original video. The simulation experiment results show that the algorithm has better invisibility.","PeriodicalId":249521,"journal":{"name":"2020 International Symposium on Computer Engineering and Intelligent Communications (ISCEIC)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117075584","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-08-01DOI: 10.1109/ISCEIC51027.2020.00031
Shasha Li, Mengjun Li, Pengfei Li, Yongjun Li
With the advent of the era of big data, storing and transferring data is facing tremendous pressure. How to use deep learning to obtain higher compression ratio and higher quality images has become an urgent problem. Recurrent neural network (RNN) can control the bit rate of images with iterative manner to improve compression performance. However, RNN needs to introduce long short term memory (LSTM) to solve the problem of long-term dependence, which leads to the model more complex. In order to speed up training process and reconstruct higher-quality images, firstly, this paper improves the activation function in LSTM to better determine the information to be stored or forgotten, so that the amount of parameters is reduced and the training process is faster. Then, the image recovery block is introduced in the decoder to reconstruct high-resolution images. Finally, instead of L1 loss, we use SmoothL1 loss to accelerate the convergence of loss. Experimental results show that our model can achieve a higher compression ratio, and evaluated by SSIM the value is more nearly to 1.
{"title":"Image compression algorithm research based on improved LSTM","authors":"Shasha Li, Mengjun Li, Pengfei Li, Yongjun Li","doi":"10.1109/ISCEIC51027.2020.00031","DOIUrl":"https://doi.org/10.1109/ISCEIC51027.2020.00031","url":null,"abstract":"With the advent of the era of big data, storing and transferring data is facing tremendous pressure. How to use deep learning to obtain higher compression ratio and higher quality images has become an urgent problem. Recurrent neural network (RNN) can control the bit rate of images with iterative manner to improve compression performance. However, RNN needs to introduce long short term memory (LSTM) to solve the problem of long-term dependence, which leads to the model more complex. In order to speed up training process and reconstruct higher-quality images, firstly, this paper improves the activation function in LSTM to better determine the information to be stored or forgotten, so that the amount of parameters is reduced and the training process is faster. Then, the image recovery block is introduced in the decoder to reconstruct high-resolution images. Finally, instead of L1 loss, we use SmoothL1 loss to accelerate the convergence of loss. Experimental results show that our model can achieve a higher compression ratio, and evaluated by SSIM the value is more nearly to 1.","PeriodicalId":249521,"journal":{"name":"2020 International Symposium on Computer Engineering and Intelligent Communications (ISCEIC)","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127430650","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}