Nowadays, in the process of program development, it is unavoidable to use third-party code repositories, but the safety of third-party code is not guaranteed. Therefore, the research of software composition analysis (SCA) is very important. In this paper, we first proposed the value dependency analysis technology for feature extraction and entity recognition of code. From the level of functions, classes, files, packages, and projects, the normalized extraction of the intermediate representation of open-source code. In view of the insufficient accuracy of the existing models based on text, identification, syntax, and other analysis technologies, the value dependency analysis technology is used for the first time to build a more accurate normalized model of control flow and data flow, effectively improving the accuracy of feature extraction and anti-aliasing.
{"title":"Research on code entity recognition matching technology","authors":"Yijiang Xu, Yulong Wang, Fan Fang, Yonghong Rao","doi":"10.1117/12.2682370","DOIUrl":"https://doi.org/10.1117/12.2682370","url":null,"abstract":"Nowadays, in the process of program development, it is unavoidable to use third-party code repositories, but the safety of third-party code is not guaranteed. Therefore, the research of software composition analysis (SCA) is very important. In this paper, we first proposed the value dependency analysis technology for feature extraction and entity recognition of code. From the level of functions, classes, files, packages, and projects, the normalized extraction of the intermediate representation of open-source code. In view of the insufficient accuracy of the existing models based on text, identification, syntax, and other analysis technologies, the value dependency analysis technology is used for the first time to build a more accurate normalized model of control flow and data flow, effectively improving the accuracy of feature extraction and anti-aliasing.","PeriodicalId":440430,"journal":{"name":"International Conference on Electronic Technology and Information Science","volume":"112 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116020546","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this paper, a novel approach for improving the output cartoon-style effect of low-resolution face images in AnimeGAN is proposed, which is an useful and effective method to generate high-quality cartoon-style face images. This new approach I proposed combines generative adversarial networks (GAN), AnimeGAN and SRGAN. The previous existing methods do not give satisfactory results on processing low-resolution images. The cartoon-style images generated from the LR images have many significant visual issues. For example, the output cartoon-style faces have some unreasonable and weird shadows and wrinkles, which is unreal and far from the effect of original images. In this paper, I introduce a new method of using SRGAN to increase the resolution of the original LR images in order to improve the output effect in AnimeGAN. At last, the experimental results show that my combined method has good output from LR images and improves the cartoon-style faces effect as well as the performance of AnimeGAN.
{"title":"Improving the effect of low-resolution face images output in AnimeGAN","authors":"Shengyi Tu","doi":"10.1117/12.2682643","DOIUrl":"https://doi.org/10.1117/12.2682643","url":null,"abstract":"In this paper, a novel approach for improving the output cartoon-style effect of low-resolution face images in AnimeGAN is proposed, which is an useful and effective method to generate high-quality cartoon-style face images. This new approach I proposed combines generative adversarial networks (GAN), AnimeGAN and SRGAN. The previous existing methods do not give satisfactory results on processing low-resolution images. The cartoon-style images generated from the LR images have many significant visual issues. For example, the output cartoon-style faces have some unreasonable and weird shadows and wrinkles, which is unreal and far from the effect of original images. In this paper, I introduce a new method of using SRGAN to increase the resolution of the original LR images in order to improve the output effect in AnimeGAN. At last, the experimental results show that my combined method has good output from LR images and improves the cartoon-style faces effect as well as the performance of AnimeGAN.","PeriodicalId":440430,"journal":{"name":"International Conference on Electronic Technology and Information Science","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128616913","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In the past decade, the research of wireless sensor network (WSN) has aroused great interest from academia, industry and government. The WSN testbed has become the key of various development projects by conducting more authentic and reliable experiments in capturing the underlying hardware, software, algorithms and dynamics of WSN. These experiments need to solve several problems, such as experimental reliability, resource efficiency, and sustainable maintenance. Due to the problems of wireless sensor networks and the diversity of applications, the wireless sensor network test bench needs to flexibly support various network topologies and be robust to achieve reliable experimental results. This puts forward practical requirements for the reliability of control software. This paper designs a stable state machine to simplify the experiment, remote health diagnosis during operation, automatic replacement of fault nodes and TDMA data log transmission to improve the reliable operation of control software.
{"title":"Design of reliable control software for wireless sensor network testbed","authors":"Wenjing Liu, Heqing Huang","doi":"10.1117/12.2682329","DOIUrl":"https://doi.org/10.1117/12.2682329","url":null,"abstract":"In the past decade, the research of wireless sensor network (WSN) has aroused great interest from academia, industry and government. The WSN testbed has become the key of various development projects by conducting more authentic and reliable experiments in capturing the underlying hardware, software, algorithms and dynamics of WSN. These experiments need to solve several problems, such as experimental reliability, resource efficiency, and sustainable maintenance. Due to the problems of wireless sensor networks and the diversity of applications, the wireless sensor network test bench needs to flexibly support various network topologies and be robust to achieve reliable experimental results. This puts forward practical requirements for the reliability of control software. This paper designs a stable state machine to simplify the experiment, remote health diagnosis during operation, automatic replacement of fault nodes and TDMA data log transmission to improve the reliable operation of control software.","PeriodicalId":440430,"journal":{"name":"International Conference on Electronic Technology and Information Science","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134205197","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
With the rapid development of cloud computing technology and various applications, enterprises have also built their own cloud platforms.As each information system gradually goes to the cloud and monitoring data increases, the security protection pressure of the cloud platform increases accordingly, resulting in weak data analysis ability and low alarm failure. Computing performance has become a key problem that restricts the security monitoring and analysis of power network under cloud platform. Aiming at the performance bottleneck of security monitoring under cloud level, this paper proposes a method to improve the efficiency of big data monitoring and analysis. This method collects the log data of all kinds of security equipment and security system in the network, and uses the real-time processing framework of Flink and ODPS data processing service on the cloud to quickly analyze the big data. Experimental results show that compared with traditional self-built Hadoop platform and real-time computing Storm, this method consumes less resources and has a faster processing speed for the same log volume.
{"title":"Big data monitoring and analysis of power network security under cloud platform","authors":"Xu Shenu-guo, Liu Jian, Guo Liang, Xue Jia","doi":"10.1117/12.2682321","DOIUrl":"https://doi.org/10.1117/12.2682321","url":null,"abstract":"With the rapid development of cloud computing technology and various applications, enterprises have also built their own cloud platforms.As each information system gradually goes to the cloud and monitoring data increases, the security protection pressure of the cloud platform increases accordingly, resulting in weak data analysis ability and low alarm failure. Computing performance has become a key problem that restricts the security monitoring and analysis of power network under cloud platform. Aiming at the performance bottleneck of security monitoring under cloud level, this paper proposes a method to improve the efficiency of big data monitoring and analysis. This method collects the log data of all kinds of security equipment and security system in the network, and uses the real-time processing framework of Flink and ODPS data processing service on the cloud to quickly analyze the big data. Experimental results show that compared with traditional self-built Hadoop platform and real-time computing Storm, this method consumes less resources and has a faster processing speed for the same log volume.","PeriodicalId":440430,"journal":{"name":"International Conference on Electronic Technology and Information Science","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116497828","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
When using the non-contact method to collect the image of the back of the hand, in view of the problems that the different degrees of finger opening and closing affect the segmentation of the finger image, the area of interest of the knuckles of the knuckles is difficult to locate, and the image is easily affected by light, a knuckles of the knuckles of the knuckles based on morphological operations are proposed. Region of interest positioning method. In this method, a combination of opening and closing operations in morphological operations is used to construct an image mask of the back of the hand, and then the mask is used to shield the area of the back of the hand, and five images of the back of the finger are separated and angle-corrected. For the corrected image, the top-hat transformation is performed first, and then the method of combining the sliding window algorithm with image information entropy is used to locate the knuckle pattern area of the dorsum of fingers. Finally, LBP and SIFT are used for feature extraction, and support vector machine (SVM) is used as a classifier, and experimental verification is carried out on the self-built back of hand image database. The experimental results show that the proposed method can eliminate the influence of illumination and environmental noise, and can accurately and quickly locate and extract the region of interest of the dorsal knuckle pattern on the back of the hand image.
{"title":"Segmentation algorithm of digital dorsal joint pattern image based on morphological operation","authors":"Zhiping Cao, Lijun Zhu","doi":"10.1117/12.2682553","DOIUrl":"https://doi.org/10.1117/12.2682553","url":null,"abstract":"When using the non-contact method to collect the image of the back of the hand, in view of the problems that the different degrees of finger opening and closing affect the segmentation of the finger image, the area of interest of the knuckles of the knuckles is difficult to locate, and the image is easily affected by light, a knuckles of the knuckles of the knuckles based on morphological operations are proposed. Region of interest positioning method. In this method, a combination of opening and closing operations in morphological operations is used to construct an image mask of the back of the hand, and then the mask is used to shield the area of the back of the hand, and five images of the back of the finger are separated and angle-corrected. For the corrected image, the top-hat transformation is performed first, and then the method of combining the sliding window algorithm with image information entropy is used to locate the knuckle pattern area of the dorsum of fingers. Finally, LBP and SIFT are used for feature extraction, and support vector machine (SVM) is used as a classifier, and experimental verification is carried out on the self-built back of hand image database. The experimental results show that the proposed method can eliminate the influence of illumination and environmental noise, and can accurately and quickly locate and extract the region of interest of the dorsal knuckle pattern on the back of the hand image.","PeriodicalId":440430,"journal":{"name":"International Conference on Electronic Technology and Information Science","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123452901","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Under the shadow of the epidemic, people's health awareness is increasingly enhanced. Wearable intelligent devices have the functions of "sports health" and "body monitoring" to provide users with comprehensive and professional health management. This paper presents a design scheme of a Bluetooth smart bracelet about sports health and body detection. This electronic bracelet adopts triaxial acceleration sensor ADXL345, which can obtain the dynamic data of human body through single-chip control. It has the advantages of low power consumption, high precision and high sensitivity. It is a new favorite of consumers in the field of electronic products.
{"title":"Bluetooth smart bracelet design","authors":"Na Qu","doi":"10.1117/12.2682428","DOIUrl":"https://doi.org/10.1117/12.2682428","url":null,"abstract":"Under the shadow of the epidemic, people's health awareness is increasingly enhanced. Wearable intelligent devices have the functions of \"sports health\" and \"body monitoring\" to provide users with comprehensive and professional health management. This paper presents a design scheme of a Bluetooth smart bracelet about sports health and body detection. This electronic bracelet adopts triaxial acceleration sensor ADXL345, which can obtain the dynamic data of human body through single-chip control. It has the advantages of low power consumption, high precision and high sensitivity. It is a new favorite of consumers in the field of electronic products.","PeriodicalId":440430,"journal":{"name":"International Conference on Electronic Technology and Information Science","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122271097","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Distribution of the radial electric and temperature field is an important parameter to characterize the performance of resin impregnated paper (RIP) high voltage direct current (HVDC) bushings. The upper discharge path is air insulated discharge, and its 50% impulse discharge voltage U50 can be calculated by lightning impulse withstand level and operation impulse withstand level, which can be corrected to 50% impulse flash-over voltage under standard atmospheric conditions, and the minimum safety clearance can be calculated according to the air clearance formula under standard meteorological conditions. In the paper, under 6250A current, the maximum temperature of fittings has reached 80 ℃, which exceeds the maximum operating temperature of 90 ℃ of the air medium bare aluminum alloy material in GB/T 11022 and the maximum temperature rise of 50 ℃ in relative environment, far exceeds the serious defect limit of hot spot temperature exceeding 80 ℃ in DL/T 664-2008 Code for Diagnosis and Application of Live Equipment, approaches critical defect limit of 110 ℃, and cannot meet the requirements for long-term operation reliability on site. The design and process are improved and optimized to improve the current carrying temperature rise performance. The results are in good agreement which proving validity of the finite element electro-thermal coupling model. Then the finite element model was used in the cone model which is much closer to the actual condenser structure. Optimization design for the condenser outer contour structure was also conducted to make sure that the hottest-spot temperature is close to 90℃ under rated operating condition, and the maximum radial E-field strength is approximately equal to 3.5kV/mm and distributed uniformly. Finally, the temperature rise and electrical performance test were carried out on RIP HVDC bushing prototype, which can vertify the feasibility of optimized design.
{"title":"Calculation of air clearance in HVDC converter valve hall based on electro-thermal coupling model and deep learning of electric equipment image database","authors":"Shiling Zhang, Haoyu Wang, Q. Xiao, Xiping Jiang","doi":"10.1117/12.2682548","DOIUrl":"https://doi.org/10.1117/12.2682548","url":null,"abstract":"Distribution of the radial electric and temperature field is an important parameter to characterize the performance of resin impregnated paper (RIP) high voltage direct current (HVDC) bushings. The upper discharge path is air insulated discharge, and its 50% impulse discharge voltage U50 can be calculated by lightning impulse withstand level and operation impulse withstand level, which can be corrected to 50% impulse flash-over voltage under standard atmospheric conditions, and the minimum safety clearance can be calculated according to the air clearance formula under standard meteorological conditions. In the paper, under 6250A current, the maximum temperature of fittings has reached 80 ℃, which exceeds the maximum operating temperature of 90 ℃ of the air medium bare aluminum alloy material in GB/T 11022 and the maximum temperature rise of 50 ℃ in relative environment, far exceeds the serious defect limit of hot spot temperature exceeding 80 ℃ in DL/T 664-2008 Code for Diagnosis and Application of Live Equipment, approaches critical defect limit of 110 ℃, and cannot meet the requirements for long-term operation reliability on site. The design and process are improved and optimized to improve the current carrying temperature rise performance. The results are in good agreement which proving validity of the finite element electro-thermal coupling model. Then the finite element model was used in the cone model which is much closer to the actual condenser structure. Optimization design for the condenser outer contour structure was also conducted to make sure that the hottest-spot temperature is close to 90℃ under rated operating condition, and the maximum radial E-field strength is approximately equal to 3.5kV/mm and distributed uniformly. Finally, the temperature rise and electrical performance test were carried out on RIP HVDC bushing prototype, which can vertify the feasibility of optimized design.","PeriodicalId":440430,"journal":{"name":"International Conference on Electronic Technology and Information Science","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122277775","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
How to predict the students’ learning trend, according to the current situation of students' learning, is meaningful for the management of students' learning process. This paper presents a study early-warning system based on machine learning, using the method of machine learning with the data related to the scores of students’ professional courses, retaking percentage, graduation rate and bachelor's degree data of three classes of School of Information Engineering of Wuhan Business University, which establish a prediction model of student learning trend evaluation (whether there is a risk of not obtaining the degree). It provides reference for college students' study management and can improve the quality and efficiency of teaching management.
{"title":"Design of study early-warning system based on machine learning","authors":"Hui Mao, Zheng Fang, Zhen Liu, Zhiqing Han","doi":"10.1117/12.2682433","DOIUrl":"https://doi.org/10.1117/12.2682433","url":null,"abstract":"How to predict the students’ learning trend, according to the current situation of students' learning, is meaningful for the management of students' learning process. This paper presents a study early-warning system based on machine learning, using the method of machine learning with the data related to the scores of students’ professional courses, retaking percentage, graduation rate and bachelor's degree data of three classes of School of Information Engineering of Wuhan Business University, which establish a prediction model of student learning trend evaluation (whether there is a risk of not obtaining the degree). It provides reference for college students' study management and can improve the quality and efficiency of teaching management.","PeriodicalId":440430,"journal":{"name":"International Conference on Electronic Technology and Information Science","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122319485","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In order to obtain high-precision DEM in the worldwide, the InSAR system of two satellite formation working in the mode of one transmitter and two receivers must maintain the interferometric phase accuracy between two satellites. The internal calibration technology is used to extract and compensate the phase of InSAR system channel to ensure the phase accuracy. Based on the composition and principle of the formation satellite InSAR system, considering the composition of the system phase error, and according to the phase synchronization design method of the phase synchronization transmission and reception links, this paper designs the internal calibration link, carries out the test, and finally gives the implementation suggestions for the internal calibration project.
{"title":"Bistatic spaceborne INSAR system internal calibration design","authors":"Yiyuan Wang, Wanlin Wang","doi":"10.1117/12.2682435","DOIUrl":"https://doi.org/10.1117/12.2682435","url":null,"abstract":"In order to obtain high-precision DEM in the worldwide, the InSAR system of two satellite formation working in the mode of one transmitter and two receivers must maintain the interferometric phase accuracy between two satellites. The internal calibration technology is used to extract and compensate the phase of InSAR system channel to ensure the phase accuracy. Based on the composition and principle of the formation satellite InSAR system, considering the composition of the system phase error, and according to the phase synchronization design method of the phase synchronization transmission and reception links, this paper designs the internal calibration link, carries out the test, and finally gives the implementation suggestions for the internal calibration project.","PeriodicalId":440430,"journal":{"name":"International Conference on Electronic Technology and Information Science","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122333171","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jiwei Liu, Yanchao Li, T. Ning, Jinmiao Song, Xiaodong Duan
With the rapid development of computer technology and Internet technology, the information age has come. The combination of computer technology and sports is one of the most popular research fields. This paper mainly completes the construction of football player number dataset and identification of football players through the jersey number. Firstly, the dataset is constructed based on player detection and number region detection. Then in the player identification task, we uses part of the backbone network of YOLOv5 model as the feature extraction module of the player identification network. Moreover, SPD-Conv module is added to improve the network recognition performance under the condition of small size target and low resolution. A series of experiments were also done to verify the performance of our proposed model. Finally, the recognition accuracy of our proposed model reached 92.75%.
{"title":"Football player identification based on YOLOv5 backbone and SPD-Conv","authors":"Jiwei Liu, Yanchao Li, T. Ning, Jinmiao Song, Xiaodong Duan","doi":"10.1117/12.2682544","DOIUrl":"https://doi.org/10.1117/12.2682544","url":null,"abstract":"With the rapid development of computer technology and Internet technology, the information age has come. The combination of computer technology and sports is one of the most popular research fields. This paper mainly completes the construction of football player number dataset and identification of football players through the jersey number. Firstly, the dataset is constructed based on player detection and number region detection. Then in the player identification task, we uses part of the backbone network of YOLOv5 model as the feature extraction module of the player identification network. Moreover, SPD-Conv module is added to improve the network recognition performance under the condition of small size target and low resolution. A series of experiments were also done to verify the performance of our proposed model. Finally, the recognition accuracy of our proposed model reached 92.75%.","PeriodicalId":440430,"journal":{"name":"International Conference on Electronic Technology and Information Science","volume":"12715 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130324730","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}