Pub Date : 2018-12-01DOI: 10.1109/IICSPI.2018.8690339
Sar Sary, Xu Shiwei, Yu Wen, Siek Darith, Sophannak Chorn
This study aims to estimate the parameters of an Extend linear expenditure system (ELES) demand function, including elasticities of expenditure, own-price, and cross-price elasticities. It further examines the household demand consumption in a rural Cambodia, using the 2017 household survey data conducted in three provinces of Cambodia namely; Takeo, Kandal and Kompong Speu. We randomly selected 240 farmers based on the regulation and sample distribution. The results show that, with regard to the estimation, own-price elasticities are comparatively inelastic demand for all commodities. On the other hand, findings show that income elasticity is positive in sign. The equipment has the highest income elasticity 10.374, which indicates that the equipment is a necessary commodity. These results reflect the higher income elasticities for all commodities, signifying that the commodity's demand will increase with increasing income.
{"title":"An Analysis on Household Expenditure in Rural Cambodia Extended Linear Expenditure System Model (ELES)","authors":"Sar Sary, Xu Shiwei, Yu Wen, Siek Darith, Sophannak Chorn","doi":"10.1109/IICSPI.2018.8690339","DOIUrl":"https://doi.org/10.1109/IICSPI.2018.8690339","url":null,"abstract":"This study aims to estimate the parameters of an Extend linear expenditure system (ELES) demand function, including elasticities of expenditure, own-price, and cross-price elasticities. It further examines the household demand consumption in a rural Cambodia, using the 2017 household survey data conducted in three provinces of Cambodia namely; Takeo, Kandal and Kompong Speu. We randomly selected 240 farmers based on the regulation and sample distribution. The results show that, with regard to the estimation, own-price elasticities are comparatively inelastic demand for all commodities. On the other hand, findings show that income elasticity is positive in sign. The equipment has the highest income elasticity 10.374, which indicates that the equipment is a necessary commodity. These results reflect the higher income elasticities for all commodities, signifying that the commodity's demand will increase with increasing income.","PeriodicalId":6673,"journal":{"name":"2018 IEEE International Conference of Safety Produce Informatization (IICSPI)","volume":"139 1","pages":"416-421"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85328284","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In order to reduce the harm caused by the thermal runaway of the power lithium-ion battery, the fire-extinguishing experiment was carried out using the self-built lithium battery combustion test platform. By testing the optimum fire extinguishing concentration, fire extinguishing time and smoke absorption capacity of the surfactant water mist containing sodium dodecyl sulfate (SDS) and polyoxyethylene ricinoleate (EL-20), then two kinds of fine water mist additives the 1:1 compounding was carried out, and the formed binary compound was again subjected to experimental research as a water mist additive. The results show that the selected water mist additives can inhibit the power lithium-ion battery fire to varying degrees, but the fire-extinguishing performance is different. In general, the water mist containing the additive has the shortest fire extinguishing time when the additive concentration is 3%; the fire extinguishing effect of the water mist containing the SDS+EL-20 composite additive is better than that of the single additive containing SDS and EL-20. Compared with pure water mist, the water mist containing SDS and EL-20 has obvious solubilization and absorption effect on harmful gases such as CH4, in fire smoke.
{"title":"Experimental study on the suppression of fire in lithium iron phosphate battery with additive water mist","authors":"Xun Li, Shun-bing Zhu, Weiqian Zhuang, Xuetong Hao","doi":"10.1109/IICSPI.2018.8690326","DOIUrl":"https://doi.org/10.1109/IICSPI.2018.8690326","url":null,"abstract":"In order to reduce the harm caused by the thermal runaway of the power lithium-ion battery, the fire-extinguishing experiment was carried out using the self-built lithium battery combustion test platform. By testing the optimum fire extinguishing concentration, fire extinguishing time and smoke absorption capacity of the surfactant water mist containing sodium dodecyl sulfate (SDS) and polyoxyethylene ricinoleate (EL-20), then two kinds of fine water mist additives the 1:1 compounding was carried out, and the formed binary compound was again subjected to experimental research as a water mist additive. The results show that the selected water mist additives can inhibit the power lithium-ion battery fire to varying degrees, but the fire-extinguishing performance is different. In general, the water mist containing the additive has the shortest fire extinguishing time when the additive concentration is 3%; the fire extinguishing effect of the water mist containing the SDS+EL-20 composite additive is better than that of the single additive containing SDS and EL-20. Compared with pure water mist, the water mist containing SDS and EL-20 has obvious solubilization and absorption effect on harmful gases such as CH4, in fire smoke.","PeriodicalId":6673,"journal":{"name":"2018 IEEE International Conference of Safety Produce Informatization (IICSPI)","volume":"65 1","pages":"53-56"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91046682","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-12-01DOI: 10.1109/IICSPI.2018.8690454
Bai Weibing, Zhang Weixin, Hong Guang
In order to improve the operational authenticity of equipment maintenance training, a three-dimensional model was built by 3D Max. A virtual maintenance training system for a certain type of air defense missile equipment was constructed quickly based on the Unity3d abstraction model and the training evaluation model algorithm. The system can complete the virtual training of equipment maintenance and evaluate the training process.
{"title":"Rapid Construction of Virtual Maintenance Training System Based on Unity3D","authors":"Bai Weibing, Zhang Weixin, Hong Guang","doi":"10.1109/IICSPI.2018.8690454","DOIUrl":"https://doi.org/10.1109/IICSPI.2018.8690454","url":null,"abstract":"In order to improve the operational authenticity of equipment maintenance training, a three-dimensional model was built by 3D Max. A virtual maintenance training system for a certain type of air defense missile equipment was constructed quickly based on the Unity3d abstraction model and the training evaluation model algorithm. The system can complete the virtual training of equipment maintenance and evaluate the training process.","PeriodicalId":6673,"journal":{"name":"2018 IEEE International Conference of Safety Produce Informatization (IICSPI)","volume":"1 1","pages":"158-160"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89285599","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-12-01DOI: 10.1109/IICSPI.2018.8690443
Shaohua Sun, Zemei Dai, Xinkui Xi, Xin Shan, Bo Wang
A large amount of fault countermeasure texts are used to guide fault handing operations in power dispatching systems. This paper transforms the identification problem of fault countermeasure disposal text into a classification problem for identifying the content of text, understanding the meaning of text and building an intelligent power grid fault handling automation system. Firstly, the characteristics of fault countermeasure text are analyzed, and the text is preprocessed according to the characteristics and classification requirements. (Term Frequency-Inverse Document Frequency) TF-IDF is used to analyze and extract and vectorize the features of words and word strings in text, then concatenated feature vectors are used to vectorize the text. classification models are built based on a variety of machine learning methods. Examples show that the feature extraction method taking TF-IDF of word string into consideration is superior to word TF-IDF, and the classification effects of different machine learning methods are compared. The examples also show that the ensemble machine learning classification model has better classification effect than the single classifier, and can identify the text of fault countermeasure disposal more accurately and efficiently.
{"title":"Ensemble Machine Learning Identification of Power Fault Countermeasure Text Considering Word String TF-IDF Feature","authors":"Shaohua Sun, Zemei Dai, Xinkui Xi, Xin Shan, Bo Wang","doi":"10.1109/IICSPI.2018.8690443","DOIUrl":"https://doi.org/10.1109/IICSPI.2018.8690443","url":null,"abstract":"A large amount of fault countermeasure texts are used to guide fault handing operations in power dispatching systems. This paper transforms the identification problem of fault countermeasure disposal text into a classification problem for identifying the content of text, understanding the meaning of text and building an intelligent power grid fault handling automation system. Firstly, the characteristics of fault countermeasure text are analyzed, and the text is preprocessed according to the characteristics and classification requirements. (Term Frequency-Inverse Document Frequency) TF-IDF is used to analyze and extract and vectorize the features of words and word strings in text, then concatenated feature vectors are used to vectorize the text. classification models are built based on a variety of machine learning methods. Examples show that the feature extraction method taking TF-IDF of word string into consideration is superior to word TF-IDF, and the classification effects of different machine learning methods are compared. The examples also show that the ensemble machine learning classification model has better classification effect than the single classifier, and can identify the text of fault countermeasure disposal more accurately and efficiently.","PeriodicalId":6673,"journal":{"name":"2018 IEEE International Conference of Safety Produce Informatization (IICSPI)","volume":"1 1","pages":"610-616"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88661375","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-12-01DOI: 10.1109/IICSPI.2018.8690400
Wenhui Sun, Jie Liu, Yichun Zhang, Qing Zhang
We use an improvement to the conventional sift algorithm to accurately recognize the image of the inscription at the bottom of purple clay teapot. We show that the improvement causes the false match rate of the image to be greatly reduced, and that the improvement meets the requirement of high-precision project such as purple clay teapot. We propose a method of adaptively selecting stable points. The feature points extracted in this way have smaller changes and are more stable with scale changes, which is more conducive to image matching. We extensively test our algorithm using a dataset of one hundred sets of images.
{"title":"Recognize the Image of the Inscription at the Bottom of Purple Clay Teapot Using Improved Sift Algorithm","authors":"Wenhui Sun, Jie Liu, Yichun Zhang, Qing Zhang","doi":"10.1109/IICSPI.2018.8690400","DOIUrl":"https://doi.org/10.1109/IICSPI.2018.8690400","url":null,"abstract":"We use an improvement to the conventional sift algorithm to accurately recognize the image of the inscription at the bottom of purple clay teapot. We show that the improvement causes the false match rate of the image to be greatly reduced, and that the improvement meets the requirement of high-precision project such as purple clay teapot. We propose a method of adaptively selecting stable points. The feature points extracted in this way have smaller changes and are more stable with scale changes, which is more conducive to image matching. We extensively test our algorithm using a dataset of one hundred sets of images.","PeriodicalId":6673,"journal":{"name":"2018 IEEE International Conference of Safety Produce Informatization (IICSPI)","volume":"22 1","pages":"645-649"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90193711","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-12-01DOI: 10.1109/iicspi.2018.8690399
{"title":"[Front matter]","authors":"","doi":"10.1109/iicspi.2018.8690399","DOIUrl":"https://doi.org/10.1109/iicspi.2018.8690399","url":null,"abstract":"","PeriodicalId":6673,"journal":{"name":"2018 IEEE International Conference of Safety Produce Informatization (IICSPI)","volume":"110 2 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79472860","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-12-01DOI: 10.1109/iicspi.2018.8690459
Kai Xu, Dairuo Li
Satellite communication system is a typical digital communication system whose communication reliability index is ultimately determined by the system error rate. In the codec mode, modulation and demodulation system components are used to determine the link carrier to noise ratio to determine the system's bit error rate. This paper first gives the threshold of the system carrier to noise ratio and link parameters calculation method, the use of Visual Studio independent development of link calculation software, link calculation, then it calculates a satellite communication system link margin.
{"title":"Satellite Link Analysis and Calculation Software Design","authors":"Kai Xu, Dairuo Li","doi":"10.1109/iicspi.2018.8690459","DOIUrl":"https://doi.org/10.1109/iicspi.2018.8690459","url":null,"abstract":"Satellite communication system is a typical digital communication system whose communication reliability index is ultimately determined by the system error rate. In the codec mode, modulation and demodulation system components are used to determine the link carrier to noise ratio to determine the system's bit error rate. This paper first gives the threshold of the system carrier to noise ratio and link parameters calculation method, the use of Visual Studio independent development of link calculation software, link calculation, then it calculates a satellite communication system link margin.","PeriodicalId":6673,"journal":{"name":"2018 IEEE International Conference of Safety Produce Informatization (IICSPI)","volume":"58 1","pages":"256-260"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84638592","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-12-01DOI: 10.1109/IICSPI.2018.8690383
Wei Wei, Wang Jing
Strategies used in methods for objective speech quality evaluation can be classified into two main categories namely one step and two-step strategy. The one-step strategy aims at an algorithm or structure which transforms speech representation directly into a scalar, and the two-steps strategy often divides the evaluation procedure into two subsequent stages. Generally speaking, it constructs firstly objective measurements predefined for the disturbance within speech signal, and then accumulates the measurements to a single value which is similar to the opinion score. The two-step strategy has been developed ahead of one step strategy, leading to the study of the one step strategy. This paper describes the principles and essential elements in these strategies, compares the differences between them, and analyses the merits and drawbacks in these methods. Some criteria regarding to the method selection in speech quality evaluation which are based mainly on the research scenario are suggested at the end of the paper.
{"title":"Understanding the Differences Behind One Step and Two Steps Strategies in Speech Quality Evaluation","authors":"Wei Wei, Wang Jing","doi":"10.1109/IICSPI.2018.8690383","DOIUrl":"https://doi.org/10.1109/IICSPI.2018.8690383","url":null,"abstract":"Strategies used in methods for objective speech quality evaluation can be classified into two main categories namely one step and two-step strategy. The one-step strategy aims at an algorithm or structure which transforms speech representation directly into a scalar, and the two-steps strategy often divides the evaluation procedure into two subsequent stages. Generally speaking, it constructs firstly objective measurements predefined for the disturbance within speech signal, and then accumulates the measurements to a single value which is similar to the opinion score. The two-step strategy has been developed ahead of one step strategy, leading to the study of the one step strategy. This paper describes the principles and essential elements in these strategies, compares the differences between them, and analyses the merits and drawbacks in these methods. Some criteria regarding to the method selection in speech quality evaluation which are based mainly on the research scenario are suggested at the end of the paper.","PeriodicalId":6673,"journal":{"name":"2018 IEEE International Conference of Safety Produce Informatization (IICSPI)","volume":"21 1","pages":"780-783"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72904440","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-12-01DOI: 10.1109/IICSPI.2018.8690385
Ruisong Ye, Yucheng Chen, Hu Lan
An adaptive color image encryption scheme using chaotic generalized Arnold map is proposed. The three base color components of the plain-image with 256 grayscale levels are decomposed into 6 parts: 3 higher bit-planes parts and 3 lower bit-planes parts. The intensity values of all these 6 parts are summed to get one secrete key used to scramble the resulted 6 matrices by sort-based approach in a cross way. Chaotic sequences produced by one generalized Arnold map are applied to diffuse the scrambled three base color components crossly as well to get more encryption effects. An adaptive strategy is adopted in both the scrambling process and diffusion process, implying that the key streams are all related to the content of the plain-image. Therefore the image encryption scheme shows strong robustness against known/chosen plaintext attacks. Other performances are carried out, such as key sensitivity, histogram, correlation coefficients, information entropy and difference attack analysis. All the experimental results show that the proposed scheme is secure and effective for practical application.
{"title":"An Adaptive Chaos-based Image Encryption Scheme","authors":"Ruisong Ye, Yucheng Chen, Hu Lan","doi":"10.1109/IICSPI.2018.8690385","DOIUrl":"https://doi.org/10.1109/IICSPI.2018.8690385","url":null,"abstract":"An adaptive color image encryption scheme using chaotic generalized Arnold map is proposed. The three base color components of the plain-image with 256 grayscale levels are decomposed into 6 parts: 3 higher bit-planes parts and 3 lower bit-planes parts. The intensity values of all these 6 parts are summed to get one secrete key used to scramble the resulted 6 matrices by sort-based approach in a cross way. Chaotic sequences produced by one generalized Arnold map are applied to diffuse the scrambled three base color components crossly as well to get more encryption effects. An adaptive strategy is adopted in both the scrambling process and diffusion process, implying that the key streams are all related to the content of the plain-image. Therefore the image encryption scheme shows strong robustness against known/chosen plaintext attacks. Other performances are carried out, such as key sensitivity, histogram, correlation coefficients, information entropy and difference attack analysis. All the experimental results show that the proposed scheme is secure and effective for practical application.","PeriodicalId":6673,"journal":{"name":"2018 IEEE International Conference of Safety Produce Informatization (IICSPI)","volume":"36 1","pages":"26-30"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88273547","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-12-01DOI: 10.1109/iicspi.2018.8690520
Yu Hui, Liu Huagang, Ma Jinru
Automobile body always bumps, resulting in a large number of pit package damage to happen, which caused adverse impacts on production. The sheet metal repairing technology were used in automobile maintenance. The theoretical basis, common methods and tools for repairing were described at first. Then procedures and standards of repairing were studied. Based on the properties of materials and the basic knowledge of mechanics, the automobile door was repaired. Experiments showed that the repaired method is good, and the repaired doors met quality standards. Practices proved that the technology were applied to other parts of automobile body, and it achieved great economic and social benefits, also.
{"title":"Exploration and Application of Sheet Metal Technology on Pit Package Repairing","authors":"Yu Hui, Liu Huagang, Ma Jinru","doi":"10.1109/iicspi.2018.8690520","DOIUrl":"https://doi.org/10.1109/iicspi.2018.8690520","url":null,"abstract":"Automobile body always bumps, resulting in a large number of pit package damage to happen, which caused adverse impacts on production. The sheet metal repairing technology were used in automobile maintenance. The theoretical basis, common methods and tools for repairing were described at first. Then procedures and standards of repairing were studied. Based on the properties of materials and the basic knowledge of mechanics, the automobile door was repaired. Experiments showed that the repaired method is good, and the repaired doors met quality standards. Practices proved that the technology were applied to other parts of automobile body, and it achieved great economic and social benefits, also.","PeriodicalId":6673,"journal":{"name":"2018 IEEE International Conference of Safety Produce Informatization (IICSPI)","volume":"11 1","pages":"352-358"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72703988","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}