PERSONAL Sign in with your SPIE account to access your personal subscriptions or to use specific features such as save to my library, sign up for alerts, save searches, etc.
This PDF file contains the front matter associated with SPIE Proceedings Volume 12332, including the Title Page, Copyright information, Table of Contents and Conference Committee list.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
Artificial Intelligence Technology and Intelligent System Development
Based on WebGIS technology and ArcGIS Server application platform, this paper completes the construction of tourism management system in ASP.NET environment. Aiming at the new opportunities of the development of urban tourism industry in the new era, the system will innovatively introduce network information technology into the development and construction of urban tourism industry, which can effectively enhance the influence of urban tourism industry, expand the scope of communication and further improve the service quality for tourists. From the microscopic point of view, the data processing capability of the system can fully realize human-computer interaction, that is, comprehensively cover the actual needs of tourists for six elements of food, accommodation, transportation, travel, shopping and entertainment in the process of tourism, and provide corresponding information services for them by virtue of convenient Web application and ArcMap's real-time map data transmission function. From the macro point of view, the application of the system is not only in line with the current national policy orientation to promote the vigorous development of cultural tourism industry, but also in line with the basic needs of tourism recovery and development in the current post-epidemic era. It is also an important measure and positive attempt to actively promote the deepening development of "internet plus tourism" and smart tourism.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
Blockchain is currently one of the most suitable technical means to open up physical entities and virtual data to the value level. Its core is to rely on a distributed consensus mechanism to achieve reliable reconstruction and transfer of value. The technical principles and value characteristics of the blockchain coincide with the inherent demands of smart energy. In order to break through the traditional electricity market-oriented trading model and improve the application level of blockchain technology in smart energy transactions, this article describes the application of blockchain technology in smart energy transactions, analyzes its key technical difficulties, and analyzes the key technical difficulties. The prospects are put forward to provide a reference for the application of blockchain technology in the field of electricity trading.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
MAC protocols are important to ensure the quality of service of UAV ad-hoc networks, which are becoming more and more popular. Facing the dynamically changing network transmission environment, the adaptive MAC protocol becomes an effective solution. In this paper, a MAC protocol based on deep Q-learning is designed. The system integrates a contention-based MAC protocol and a scheduling-based MAC protocol. Using the deep Q-learning approach, it switches between CSMA and TDMA according to the current state of the UAV (e.g. throughput rate, latency, etc.). Two different network scenarios were designed and simulated to evaluate the performance of the designed MAC protocols. The results show that the performance of the designed adaptive MAC protocol outperforms that of a single protocol in terms of performance such as latency and throughput.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
Smart energy service is a new energy service model under the background of energy internet. There are many production and sales entities in the smart energy service system, and energy production and consumption are diversified. Aiming at the problems of information security and loss in the dispatching process of smart energy system, an energy-based Blockchain-based smart energy service scheduling optimization model. Using the characteristics of decentralization, trustworthiness and transaction transparency of blockchain technology, build a smart energy service network architecture based on blockchain; establish a scheduling optimization model with the goal of maximizing system economic benefits and environmental protection benefits, effectively reducing system costs. Operating costs have greatly improved economic and environmental benefits. The case analysis shows that the energy blockchain technology can improve the security of the smart energy system and ensure that the relevant data cannot be tampered with; at the same time, the constructed smart energy service scheduling optimization model can provide decision support and theory for the operation management and scheduling optimization problems of the smart energy system support.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
With the active development of college sports, at the same time, the intelligent resource management system related to
sports has also been widely used. In order to manage and analyze sports resources in Colleges and universities, the
intelligent management system of sports resources is constructed by using cloud platform technology. The intelligent
management system of sports resources is a data management system based on the cloud platform. The intelligent
resource management system mainly adopts network technology, big data technology and Internet of things technology,
so as to realize the scientific management of sports resources and promote the continuous development of sports. The
intelligent management system of sports resources can also be networked with various sports equipment, such as training
venues, exercise centers, sports equipment, etc. after these equipment are associated, the intelligent management system
of sports resources can observe the sports efficiency and actual situation of students in real time, so as to better carry out
sports training. The data generated in this process will be quickly uploaded to the cloud platform management center,
which will be responsible for analysis and recording by the cloud platform, greatly improving the data analysis ability of
students' sports, improving the college sports system, and providing technical support for the scientific management of
sports resources. Therefore, with the support of the cloud platform, the intelligent management system of sports
resources can run efficiently and actively improve the running speed of the system.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
In recent years, the design of landscape resource sharing system based on SQL database has become an important means to realize the remote landscape resource sharing system, and the design framework of landscape resource sharing system is gradually realized through SQL database. However, the existing landscape resource sharing system is often based on the school, which is difficult to access each other. Virtual laboratory experimental resources are difficult to share, resulting in a waste of resources in the construction of landscape resource sharing, more importantly, the experimental data can not communicate, students in the process of experimental study can not be realized, which greatly weakens the influence of experimental teaching, hindering the popularity of network teaching and distance teaching. Therefore, to build a virtual peer-to-peer network system on the existing network and design a distributed cooperative experimental platform that can be cross-platform and support a variety of operating systems has become an urgent problem for the landscape resource sharing system of landscape architecture. In view of the current situation of landscape resource sharing system design, this paper puts forward its own views and makes a judgment on the current problems. The purpose is to speed up the process of landscape resource sharing system design and improve the progress of landscape design.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
Redundant robots are widely used because of their superior flexibility. However, due to the physical constraints and the influence of uncertain obstacles in the workspace, it brings great challenges to the high-precision kinematic control of redundant robots. This paper presents a real-time obstacle avoidance and high-precision kinematic control method for redundant robot based on improved danger field method. An improved danger field description is established to improve the adaptability of the system to dynamic obstacles by introducing the speed forward-looking information between robot and obstacles. The kinematic control strategy with finite time convergence is designed. The dynamic programming type problem description is established through two terminal inequality constraint modeling of joint angle and velocity. Then a recursive solver is designed to solve the nonlinear HJB problem, and the control command is obtained in real time. The stability of the closed-loop system is analyzed. Simulation results show that the proposed method has better obstacle avoidance performance than traditional dangerous field, and has better advantages in avoiding physical constraints.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
Currently, the Southwest Regional Data Center Inspection Robot checks for hidden dangers or associated hidden dangers using traditional approaches (such as empirical method and permutation and combination method), which makes it difficult to properly identify hidden dangers. Many hidden dangers cannot be identified solely by the cognition and rules and regulations of the data center's on-site operation and maintenance personnel because the time and space distribution of hidden dangers is not clear, and the hidden dangers have characteristics of concealment and randomness. As a result, how to effectively use the inspection robot's back-end platform to collect basic data, combine historical fault hidden dangers records, and use the correlation mining method to find the correlation between different hidden dangers, allowing you to check the hidden dangers in the data center and achieve the goal of accident prevention.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
With the rapid development of information technology, the integration of information technology and various fields has promoted the innovation of related technologies. Enterprise management is more convenient and fast because of the application of information technology. The effective application of information management system based on agile development in enterprise management can not only strengthen internal management, but also effectively prevent risks and improve enterprise competitiveness and service level. With the rapid development of science and technology, automation and intelligence have become a reality, creating new opportunities for the development of various industries. With the continuous advancement of urbanization, the design and application of enterprise management system template based on agile development are gradually applied in the enterprise management industry, which provides help for enterprises to save costs and improve work efficiency. However, enterprise management system needs the development, installation and application of various programs. If there is a problem in one link, the quality of the overall work will be affected. Therefore, this article is based on agile development in enterprise management system on the basis of the template corresponding to the design and development of research, from the current situation of enterprise management, this paper expounds the application of agile development in the enterprise management system significance and influence of the use of the effective ways to provide corresponding to its, purpose is to speed up the efficiency of management of the enterprise. So as to further accelerate the design and application process of enterprise management system module construction.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
Frequency hopping communication as one of the most important branches of extended frequency communication, has a strong anti-search, interception, anti-interference ability, can improve the short wave communication performance, this paper using Simulink simulation platform in MATLAB communication F H/MFSK system for simple modeling simulation, to prove that frequency hopping communication technology can indeed improve short wave communication performance.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
Purpose in industry, electric actuators are the main device to control valves. In order to solve the problem that users can monitor and control their valves anytime and anywhere. The communication method of NB-IoT is adopted to control the electric actuator accordingly. The main control chip of the system is STM32 chip, which can collect the specific information of the valve position. The position information of this valve is uploaded to Aliyun IoT platform through the BC20 chip which adds all collected messages to the database and operate the electric actuator remotely on the corresponding interface to achieve control of the valve. Complete remote monitoring and control of electric actuators.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
At present, most of the existing network monitoring and fault repair rely on the rule system or manual processing, however, with the increasing scale of the network and the diversification of business, this approach is difficult to meet the requirements. With the rapid development of artificial intelligence technology, Artificial Intelligence for IT Operations (AIOps) has also made great progress. Anomaly detection of KPI (Key Performance Indicator) is a core technology of AIOps, through which the manual workload and O&M cost can be reduced, meanwhile, O&M efficiency can be enhanced. In this paper, using the performance of the KPI of operator base stations as research data, a simple and efficient algorithm is proposed to detect the anomalous values and periods of three core indicators, namely, the average number of users, the PDCP flow, and the average number of activated users. At last, 1014 anomalous values and 203 anomalous periods were detected. Unlike the current network O&M which commonly detects anomalies based on human-defined rules and fixed thresholds, the anomaly detection algorithm used in this paper is practical and has good operability, which can help O&M personnel to better solve the network operation and maintenance problems.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
Deep learning has made good progress in intrusion detection field due to its powerful adaptive learning capability, but deep learning computes more and more slowly as model layers deepen, and existing deep learning models rely on datasets with artificially designed features, which in turn makes the models need to be deepened to learn the complete features, such data also makes it difficult to generalize the trained model. To solve these problems, we propose a method for extracting packet bytes from PCAP files as features to enable the models to learn the original features. Then propose a deep learning model IDPnet, which mainly employs one dimensional depthwise separable convolution, it regards each packet as channels, learns features through depthwise and pointwise convolution hierarchically, which greatly reduces the inference time while improving the accuracy compared to common CNN models that using converted grayscale image as input. Finally, we conduct transfer learning on IoT dataset, demonstrating that pre-trained model can be reused on data from different devices and protocols using packet data as features, reducing training time.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
With the continuous development of China's economic and social construction, China's administrative management system has gradually shown a higher level and a high degree of intelligence, and the perfection of information between colleges and universities has formed its new characteristics and advantages in college management. The introduction of various public platforms, including wechat public accounts, into the administrative management system can improve the upgrade and conditions for the establishment of the administrative management system, and is an important attempt to build a constructive relationship between the college and students. The introduction of wechat assisted teaching provides a new opportunity for the innovation of educational technology in colleges and universities. In the process of using wechat platform, the use of its information dissemination, exchange and interaction, knowledge sharing and other features is a kind of technological innovation committed to expanding the scope of professional learning knowledge in colleges and universities and promoting the in-depth understanding of knowledge. It can effectively break the constraints of time, space and content in professional teaching, and innovate the professional teaching mode of colleges and universities, and improve the level and efficiency of professional personnel training through the mutual cooperation of application function modules and flexible switch between task-based application mechanism and interest-based application mechanism. This paper takes administrative management as an example to explore the application of wechat auxiliary technology in professional teaching in colleges and universities, and makes relevant analysis and explanation according to the current status of administrative management system, aiming to strengthen the application of administrative management system and speed up the connection with wechat public platform.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
Tourist waterway have high requirements for water quality. Aiming at the large AUV equipment can not meet the needs of lake reservoir area, a portable small underwater robotic fish system is developed. The system consists of underwater robotic fish and shore remote monitoring and data analysis system. The underwater robotic fish has the ability of long time endurance, automatic navigation, pollutant detection and source determination, video acquisition and automatic defogging; The onshore remote monitoring and data analysis system can monitor the underwater operation of robotic fish in real time and carry out three-dimensional visual analysis of the collected data. The system has been tested and applied in Cao’e River, China, which realizes the automatic detection of water quality and provides an effective means for pollution control.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
So far, China's economy has sustained growth, the scientific field has also got great progress, economic development mode accelerated transformation. The rapid development of China's economic society and science and technology requires enterprises to constantly innovate, change and transform, and at the same time puts forward higher requirements on the professional ability, comprehensive ability and professional quality of business management personnel, requiring business management personnel to quickly adapt to the new market trend, find new opportunities and obtain new information [1]. Under the international and domestic situation, Chinese enterprises face the strategic choice of reform and innovation, and need to constantly enhance their ability to adapt to the environment, which tests not only entrepreneurs but also business managers' management wisdom. Improving the ability of business management personnel is one of the important means to promote the long-term healthy and steady development of enterprises, and business management is a complex, systematic and comprehensive work, how to improve the professional ability of business management personnel, should be carried out key research. This paper mainly describes the artificial intelligence development environment of business management system framework construction, from a realistic perspective on the enterprise business management system research, the purpose is to study the enterprise business management personnel should have the basic ability and specific ways to improve, in order to provide reference and help for business management personnel.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
With the widespread use of the music Intangible Cultural Heritage Archives Information resource management platform, the use of blockchain technology has become a key part of the music Intangible Cultural Heritage Archives Information resource management platform. Blockchain technology has become a key technology in the design of music Intangible Cultural Heritage Archives Information resource management platform. While using blockchain technology, it also provides a new development direction for platform information management. This paper analyzes and studies the application structure and key technologies of the music Intangible Cultural Heritage Archives Information resource management platform, and analyzes the practical role of the blockchain technology in the Jiangxi music Intangible Cultural Heritage Archives Information resource management platform. The blockchain technology and the music Intangible Cultural Heritage Archives Information resource management platform are deeply integrated to create a new resource management model. Blockchain technology is shared, tamper proof, reliable and traceable. It can improve the operation and tracking of information in the music intangible cultural heritage archives information resources, and use the blockchain network to manage and track these information resources, so as to reduce the risk and cost of management by all parties.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
With the continuous development of computer technology, communication technology and multimedia technology, the application of web-based digital information platform administration can greatly improve the work efficiency. As the change of the world economy, information management and information systems professional also in corresponding change, the original information management professional emphasis from pure technical or management mode into into today's "information technology + management" model, in the more mature technology in computer science, information science, management science and other multi-disciplinary for communication and integration. The digital information platform software system that implements administrative work management through network is a set of software systems that are used to establish, store, organize, manage, maintain, track and provide personalized resource objects. In the era of big data, there are still many difficulties waiting to be solved in information management. This article combines the nowadays information professional management of the status quo, in the current environment put forward the development of digital management information platform and research, in view of the difficulties in detail in this paper, the nowadays appear, and accordingly put forward the solution to the problem, purpose is to speed up the development of digital management information platform and research, to further strengthen the construction of management information platform.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
The current e-commerce distribution situation is not ideal, and the supervision and distribution efficiency is low. In order to solve this problem, it is necessary to design the e-commerce distribution system based on Hadoop technology. Through Hadoop technology to collect the distribution source data, and use the algorithm to design the best distribution scheme, the waybill data for storage, can improve the efficiency of all aspects of the e-commerce distribution system. In the system experiment, it is also proved that the Hadoop's-based e-commerce distribution system has better load performance and strengthens the supervision of transporting goods, realizing the purpose of completing the delivery in the shortest time. However, in the subsequent research, it is also necessary to strengthen the comprehensive performance of the system to make the system more stable
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
Warehouses with dense storage of goods and complex environments are places of fire hazards. At present, there is still a lack of mature intelligent fire-fighting equipment in the market. In view of this situation, the intelligent fire-fighting robot based on machine vision detection technology is studied and designed. In the research, it is found that flame detection based on color feature analysis is easily interfered with by objects with similar color features. In order to reduce the interference of static objects, a method combining continuous moving object detection and color feature analysis is used for flame detection. Firstly, the improved background subtraction method is used to detect the moving object in the video stream. After detecting the existence of a moving object, it is needed to wait for a short period of time, and repeat the moving object detection again to determine that there is a continuously moving object in the video stream. Finally, RGB and LMS color models are used to analyze the flame color characteristics, and the flame image is detected and recognized according to the set detection rules. The experimental results of flame detection show that the algorithm has strong adaptability to the environment, which can achieve real-time flame detection, and effectively reduce the interference of static objects with similar colors and instantaneous light.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
In order to solve the data and information resources merging and sharing between different databases, make full use of the databases already used by enterprises and institutions, realize the connection, data exchange and data sharing between different databases, and solve the problem of "information island" in the current information system application to the greatest extent. This paper uses XML data exchange technology to build a data exchange center model of heterogeneous databases, which enables safe, reliable, traceable and efficient information data exchange between different databases of various application systems through the data exchange center; While providing exchange, it can restrict, manage and record the access rights of users.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
Network recommendation provides great convenience for people to make information selection. But it also produces a "filter bubble" effect and results information narrowing phenomenon. In order to study the influence of this phenomenon on individual user-choice, this paper proposes a research method based on the improvement of Slim recommendation algorithm on individual selection tendency, then we select indicators such as coverage and prevalence to measure the impact results. Through the data obtained by the experiment, the existence of this effect is determined after analysis, and we summarized the resulting group cognition problems, finally we prospect the follow-up work.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
This paper aiming at the functions completed by the air target track processing system. The test requirements to support this type of system are analyzed. The method of interpolation and extrapolation is used to realize the simulation of the whole theoretical trajectory of the track. We select different working states of multiple devices to generate test data and realize the ability to send test data packets and manage test data. According to the designed test case. Through the control of the software interface. The test data is sent according to the requirements of the test case. And the testing supporting system is able to manage test data can test and reuse test data. The test cases in similar software systems to shorten the test cycle. It well improve the efficiency of software testing and the coverage of software testing and ensure the reliability of the system under test.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
VR panoramic teaching resources can create an immersive teaching situation for teachers and students. Aiming at the problems of tedious manual annotation and easy omission of VR panoramic teaching resources during the course preparation of karst landform teaching teachers, this paper designs an automatic association method for knowledge points of VR panoramic teaching resources to construct the training set of karst landform sample images based on Convolution Neural Network(CNN), which can extract the karst landform teaching objects in the panoramic images, and associates and locates the knowledge points stored in the object relational database in the VR panoramic space. Finally, a prototype system of "Geographical Karst" teaching course of senior high school geography published by People’s Education Press is constructed. The experimental results show that this method can realize the automatic correlation of VR panoramic teaching resource knowledge points.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
In order to effectively realize the early warning and interception of hypersonic weapons, an air-space-ground integrated early-warning and detection system is proposed to build. By cooperating with the early warning and detection subsystems in the whole range of land, sea, air and sky, the launch alarm, detection identification and continuous tracking of hypersonic targets are realized. Detection models of different subsystems are constructed, and the detection capabilities are analysed by using the models. The key factors and influence trends that affect the detection capabilities of each sub-system of the air-space-ground integrated early warning and detection system are clarified, and theoretical reference and data support are provided for further equipment demand analysis and demonstration.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
With the rapid development of information and intelligence, the intelligent driving system has also made great progress. The system is the integration of modern science and technology such as electronic informatization and intelligence. It is one of the key technologies to solve the problem of traffic congestion. Intelligent vehicle driving technology can improve driving safety and alleviate driving load. This paper mainly introduces the autonomous intelligent vehicle driving technology, establishes the intelligent driving technology model, simulates the operation of the adaptive cruise control system through CarSim software, and obtains the vehicle simulation operation process and simulation curve, intelligent vehicle driving can effectively improve the multi-objective performance of vehicle, such as safety, steering stability and operation feasibility.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
The overall scheme of 16 palace grid material access was designed, for three-dimensional intelligent storage system, and the control procedures was developed also, to realize the management and automatic access of flexible manufacturing blanks and finished products, improve the production efficiency and reduce the production cost.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
As an indispensable part of marine instruments, marine echo sounder plays an important role in the process of navigation. In order to solve the problems of less experimental equipment, low teaching efficiency and objectivity and accuracy in the evaluation process of the echo sounder operation. This paper analyzes the characteristics of echo sounder, selects the cross-platform development tool QT, establishes the evaluation model, and realizes the automatic evaluation system of simulation training of echo sounder. The operation interface of the virtual simulation equipment of the marine echo sounder is basically consistent with the real equipment, and can simulate all the functions of the marine echo sounder. The evaluation system is stable and the scoring method is reasonable. It can objectively and accurately reflect the actual operation situation, and can be well applied to the simulation training of navigation instruments.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
Intelligent Communication Technology and Image Signal Processing
The wireless body area network (WBAN) is a branch of the wireless sensor network in the healthcare Internet of things (IoT) systems. Wearable body sensors are placed on or in the human body and collect physiological information. The traditional sensor-cloud network architecture is challenging due to the data transmission time delay from sensors to remote cloud servers, especially for emergency applications. In this paper, we design an edge computing-based network architecture for the eHealth systems. The mobile edge server can decrease the time delay and energy consumption. The proposed network architecture can also enhance the system quality of services (QoS) and quality of experience (QoE).
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
Metaverse is a virtual digitization of the physical world. It encompasses the sum of the virtual digital world, the physical world and their interactions. At present, the development of metaverse is early, its definition, boundaries and operating rules still unclear. However, with the development of the Internet and emerging technologies, metaverse will usher in exponential and rapid development, and the correlation between metaverse and the physical world is the foundation of it. So, this paper explore the theory of deductive relationship between metaverse and physical world from mapping and distributed autonomy, which is verified and applied on specific application of improving urban green view. Specifically, this paper proposed an theory of isomorphic mapping between the physical world and metaverse, and innovate the spatial division method of green view according to the characteristics of person vision in the metaverse, proposed a formula of metaverse green view (MGV). And we design an algorithm of membership access decentralized voting for realize the transformation from centralized urban governance to incomplete decentralized co-governance.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
At present, 5G communication technology is developing rapidly, but there are still many defects in the development. In order to solve the problem of low gain and efficiency of 5G patch antenna, a millimeter wave microstrip patch antenna for 5G communication is designed in this paper, which can make better use of communication channel and frequency and improve the performance of the antenna to a certain extent. The initial antenna design parameters were obtained according to the relevant calculation formula, but the initial simulation results failed to reach the best performance. After optimizing the design and adjusting the parameters, better gain and return loss are obtained, and the result which is best is obtained. The software for simulation used in this design is CST, which shows the antenna simulation model and the change of input echo parameters and impedance. The embedded feed antenna of 10mm×10mm chooses N257 frequency band, with a bandwidth of 100MHz and a patch size of 5.835mm×3.89mm. The gain, return loss and radiation at 26GHz are analyzed by simulation. The design is linearly polarized, which is easier and simpler to construct, and has a stable radiation pattern. The results show that the designed antenna is befitting for 5G millimeter wave band and has high application value, which provides a reflection for the development of 5G patch antenna.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
In order to analyze the failure of communication messages of the operation control communication unit under high-speed maglev, a data transmission monitoring system of the operation control communication unit under high speed maglev is established by using several computers and switches. This paper first analyzes the special wireless communication mode and message format of high-speed maglev data transmission, and then carries on the hardware architecture design and software architecture design respectively, and completes the compilation of related programs. Finally, the monitoring of data transmission of operation control communication unit is realized, and the function of multiple devices in the data communication link can be simulated. It lays a foundation for the safe operation and fault diagnosis of high-speed maglev vehicles.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
In recent years, mining industry has developed very rapidly in China. In mining industry, coal mining is the most arduous and dangerous work. The application of 5G integrated innovative technology can provide a better communication foundation for the construction of smart mines, realize the effective management of the whole process of mine production, as well as ensure the safety and reliability of mine production. It is of great significance to the development of mineral industry in China. In this paper, by analyzing the pain points of coal mining operation and the needs of information transformation, we comb and disassemble the information transformation work. Through the top level architecture design, we construct with standardized process and modular functions, so as to realize the information transformation of coal mining operation and establish a benchmark of informatization innovation demonstration combined with 5G + integrated application innovation.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
With the recent development of optical wireless communication (OWC), it has become the hot spot of next-generation communication technology. The demand for communication is increasing, the past RF system cannot satisfy the modern communication needs, so to find a higher bandwidth of communication, OWC becomes one of the RF system innovation complementary technologies. In OWC, pulse position modulation (PPM) technology is a more important modulation technology. Hence, this study focuses on Q-ary PPM technology. In this study, we utilize MATLAB for simulation, demonstrate the difference between digital PPM and analog PPM, and simulate the simplify digital communication system. The PPM signal will pass through the Additive White Gaussian Noise (AWGN) channel. We also discuss some demodulate theory, then analyze the effect of different signal-to-noise ratios on the signal, and finally Q-ary PPM bit error performance (BER) analysis has been given, which is based on soft decision and hard decision respectively. The study found that digital PPM is more applied than analog PPM nowadays, and different demodulation methods have different effects. Finally, with an increased Q value the BER becomes smaller.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
With the fast development and enhancement of the 5G millimeter-wave technologies, antennas with better performance of data rate, bandwidth and quality of service are in high demand for the further applications. In this work, a notched quadruple-band microstrip patch antenna is proposed, with operating frequencies of 39 GHz, 56 GHz, 70 GHz and 93 GHz. The antenna is designed on the substrate of 0.254 mm RT/duroid 5880, and based on the principle of 50-Ω microstrip feeding line impedance match. The optimization of dimensions and measurement of performance are carried out by the software of CST 2021. The performance and properties are analyzed in terms of return loss, bandwidth, VSWR, E-field mode, realized gain, and radiation patterns on E-plane and H-plane. The proposed antenna shows a good performance of low return loss, wide bandwidth and high realized gain, and has the potential to be applied to fixed and mobile communication, satellite earth exploration, inter-satellite communication, space research, radio navigation, radio location, and radio astronomy.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
Aiming at the problem of low accuracy for fire image segmentation, this paper proposes a method based on full convolution neural network. Firstly, on the basis of SegNet network, this method reduces the complexity by appropriately deleting the number of network layers, and the SegNet model becomes a lightweight full convolution neural network model. Then, the parameters of the first four convolution layers of VGG-16 trained based on multiple data sets are transferred to the coding part of the full convolution neural network. According to the training, verification and test, the model based on the optimal parameters is selected to segment the fire area of the image, and the segmentation results are obtained. Finally, the experimental results show that this method can completely segment the fire area from the image. Compared with other common methods, the segmentation accuracy of this method is higher, its accuracy can reach 93%, and the time-consuming is 0.12s.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
In the cognitive satellite-terrestrial networks, the channel selection anti-jamming decision problem under complex jamming conditions is studied for ground-based cognitive users suffering from complex jamming, including co-channel jamming of multi-beam satellite communication systems, inter-user mutual jamming and external malicious jamming, and modeled as a Stackelberg game. Then, the existence of the Stackelberg equilibrium is proved theoretically. Finally, in order to obtain the equilibrium solution of this anti-jamming channel selection game proposes a Trial and Error of Hierarchical Learning Algorithm (TEHL). After simulation analysis, the convergence and effectiveness of the algorithm are verified.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
After the 5G (5th generation mobile network) defined by 3GPP (3rd Generation Partnership Project) in 2019, the communication devices based on 5G frequency bands are required. Two frequency range of 5G NR (5G New Ratio) has been defined as FR1 and FR2, in which FR means frequency bands. FR1 (450MHz-6000MHz) is commonly referred to as 5G Sub-6GHz (below 6GHz) frequency band, while the frequency range FR2 (24250MHz-52600MHz) is 5G millimeter wave frequency band. This article put forward a single rectangular patch working in K-band with two notches for 50Ω network matching and a two-by-two microstrip antenna array configuration feeding evenly by power dividers with the compact size of 20 x 20mm2 in CST simulation. Both of directivity and gain are enhanced with realized gain over 13.3 dBi with over 76% efficiency and 3-dB beamwidth less than 30 degree in main lobe. The single patch has compact size of 12 x 10mm2 and good matching performance with return loss less than -45 dB at resonant frequency 26 GHz, which can be easily integrated in large scales of antenna arrays or MIMO systems. The patch and array can be the basic model to develop more advanced design.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
In this paper, the working mechanism of Border Gateway Protocol (BGP) is deeply analyzed. In order to solve the security problems of the Internet, reverse engineering method is used to put forward a DDoS attack model against BGP. The purpose is to solve the vulnerability problem of BGP. The network topology identification method based on the combination of BGP protocol attributes and Traceroute routing footprint solves the problem of locating the core routing nodes in the network topology. The OPNET simulation platform is used to build a network topology structure, and the core BGP router is simulated DDoS attacks to verify the vulnerability of BGP protocol DDoS attacks will lead to severe network traffic concussion, and even the possibility of network paralysis. Finally, an exploratory defense strategy based on BGP DDoS attack is proposed to address the vulnerability of BGP.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
In recent years, deep learning has achieved remarkable success in various fields, which largely relies on a large amount of data to train deep learning models, and in many practical applications, sufficient data is not necessarily available. When the amount of data for training the model is limited, the data set can be enriched by data augmentation, thereby improving the generalization ability of the deep learning model. Aiming at the problem of insufficient data in the process of building a dynamic compensation model with deep learning methods, this paper proposes to use mixup to enhance the dynamic calibration signals obtained from a small number of pressure sensor dynamic calibration experiments. Experiments show that using the augmented data to train the compensation model can effectively enhance the generalization of the model and improve the compensation ability of the model.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
Digital communication is a kind of method that carrier is applied to digital signal for transmitting message, or uses digital signal to carry on digital modulation to the carrier and transmits the communication mode. Digital signals such as telegraph, digital data, and analog signals such as voice and image that have been digitally processed can be transmitted. Besides, since the rapid development of modern technology such as computer technology, digital storage technology, digital switching technology and digital processing technology, many signals at equipment and terminal interface are digital signals, hence it is convenient to connect it with the digital communication system. Anyway, the purpose of this project is to use MATLAB programming to construct a digital communication system, demonstrates the results of its operation and analysis eleven different factors may affect the communication of the system. All the functions of different sections are separated and named in their own file with its annotation. The comparisons of results that are influenced by different factors are well explained through figures or tables. All the efforts are targeted to minimize the error between input file and output file to build a qualified digital communication system and prove more useful data for the reference of this field.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
As the enhanced mobile broadband technology is commercially deployed in a growing number of regions, there is a gap between 5G millimeter wave frequency bands and high efficiency and high gain antennas. This paper presents a design of a microstrip patch antenna array with RT Rogers 5880 substrate that operates in the n257 channel, which has an operating frequency of 28 GHz, and has a bandwidth of 400 MHz. The parameters of the single elements are derived from the result of theoretical calculations. The performance of the single element is simulated by CST and evaluated to instruct the refinement of the parameters. After the design of the single element of the microstrip patch antenna, the design of the microstrip patch antenna array is proposed. It is also refined according to the evaluation of simulation results. The finalized patch antenna array design fed by a 50 ohms system has a realized gain of 13 dBi and 3dBi angular width of 15.8 with a working efficiency of 88% while operating at 28GHz with a bandwidth of 500 MHz. Moreover, compared to single patch antenna, the patch antenna array features in high spectrum effectiveness, high community, and can be applied to multi-beam antenna system. It also small and reasonable in cost. It has high potential to replace the single patch antenna in the area of mobile communications, satellite communications and global positioning systems and complement with 5G technology.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
This article uses Visual Studio 2015 to develop, using a variety of encryption algorithms, including Virginia algorithm, Caesar algorithm, single table replacement algorithm technology, to achieve efficient and secure information. The system runs in the Windows system, the function is stable, and the information security is effectively guaranteed. In this paper, the research of the subject is carried out first, and the key technologies of cryptography are sorted out. Present the current research status and introduce the main research contents. Then analyze and organize related technologies, introduce their advantages and disadvantages, and then compare encryption algorithms. Finally, the implementation and evaluation of the algorithm are carried out. The realization of the encryption software based on the classical cryptography algorithm ensures the encryption in the transmission process and solves the problem of data security.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
In China, 5th Generation Mobile Communication Technology is coming to use in a large number of areas. The transmission in the specific areas is significant. Antenna is a necessary tool in wave transmission in the technology. In this paper, the aim is to design a 25.5GHz microstrip patch antenna. 25.5GHz microstrip patch antenna can play a significant role in transmitting wave in different areas. High frequency range allows fast transmission speed, low time delay and precise information transmission. The detailed parameter of designing the microstrip patch antenna and the working principle of microstrip patch antenna are shown in this paper. The result of this paper achieves the standard antenna parameters. The 25.5GHz microstrip patch antenna in this paper improve the communication technology in speed and accuracy. It can solve the problem of delay in telesurgery area. The antenna can help achieve the aim there is no delay in telesurgery. Hence, the 25.5GHz microstrip patch antenna can be applied in a large number of areas to a great extent in improving the efficiency of communication.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
Until the appearance of Turbo codes, people have found a code that is close to the Shannon limit - Turbo codes. In the era of 3G and 4G, people used Turbo codes for encoding. This paper briefly introduces Shannon's theorem and the compiling principle of Turbo codes and uses MATLAB to analyze the factors that affect the performance of Turbo codes. With the development of the information era, current research has become the fifth-generation mobile communication technology. Consequently, this document briefly presents the 5G communication standards. At the same time, this paper analyzes the reasons why Turbo codes are eliminated in 5G communication systems by comparing Turbo codes with other coding schemes and proposes simple improvement measures at the end.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
Over the past few years, with the rapid development of satellite communication technology, people have increasingly high standards for the quality of satellite communication. As an ideal code type close to Shannon limit, Turbo code has also been widely used in the field of satellite communication and has become the focus of channel coding research. Turbo code is a parallel concatenated convolutional code. It uses the iterative soft in and soft out decoding method to achieve the performance close to the Shannon limit. First, the basic theory of Turbo code and the related structures of encoding and decoding are introduced in detail, and the causes of Turbo code error floor problem are analyzed. In the process of studying the performance of Turbo codes, different parameters are simulated, such as code length, interleaver length, different iteration times and so on. In addition, a scheme of product code composed of BCH code and Turbo code is proposed to effectively deal with the error floor problem. By analyzing the simulation results, the conclusion of the influence of different parameters on the performance of Turbo codes is obtained, and the error floor problem is effectively improved. By improving the performance of Turbo code, it can be used more widely.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
Aiming at solving the problem that RS code cannot be applied in gigabit Ethernet transmission due to the length of Ethernet random frame, a module for slicing Ethernet frame is designed in this paper. The designed slicing module can slice Ethernet frames of any length to adapt to RS codes of different lengths, and the receiver module can find the slicing frame header again and restore the slicing frame to Ethernet frame. The experimental results show that the designed transmitter and receiver can slice and restore Ethernet frames at Gigabit rate, and there are no transmission error frames, which meets the design requirements.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
Huge channel capacity is required in modern and future human communications. In 5G millimeter-wave signal transmission, the type of antenna determines the amount of transmitted signal to some extent. For different kinds of antennas, patch antenna is widely used in mobile devices such as smart phone in terms of low-profile and cheap manufacture. Despite relatively narrow bandwidth, patch array antenna has ameliorated this disadvantage by using tunable excitation amplitudes and phases. This paper mainly studies the performance of a single patch antenna with substrate Rogers 5880 operating in millimeter-wave channel n259 to explore the design principles of patch antennas. The three-layer structure of antenna and the calculation process of antenna dimensions, which are patch size and substrate thickness, are introduced. Two feeding methods which transmission line feeding and coaxial cable feeding are separately simulated in CST Studio software, and then their performance especially the gain of far-field radiation pattern in E-plane are compared. Both of these two feeding methods display favorable performance. However, coaxial cable feed antenna behaviors better because of less propagation loss.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
As a core problem in the field of robotics, kinematic control plays an important role in the control of redundant manipulators. In this paper, a joint control strategy is proposed for kinematic control of redundant manipulators. This strategy transforms the traditional solution of objective function extremum into recurrent neural network (RNN) solution, which not only reduces the amount of computation, but also restricts the joint states of the manipulator to a certain extent and ensures the safety. Finally, a new kinematic control optimization index is proposed, which combines the kinetic energy of the manipulator with the minimum norm of joint velocity. The effectiveness and rationality of the proposed method and optimization index are verified on FRANKA platform which is a 7-DoF redundant manipulator. It aims to effectively reduce energy consumption in the process of manipulator movement.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
This paper presents a community health models and designs a corresponding system using wearable care devices depend on Internet of Things, Cloud Computing, Data Analytics and other information technologies. For common chronic diseases, Electrocardiogram, respiration, pulse, temperature, and movement status signals are selected as important bases for reflecting the health status and determining the condition of the body. This paper designs the function of the wearable smart device and introduces the smart device's early warning function, built-in sensors, and various human monitoring components. The smart device can accurately judge the condition of the elderly. When an abnormality is found, it will send an alarm to the mobile phone in time, so that guardians and children can grasp it in real-time. Based on the user perspective, we propose strategies to meet user expectations and improve user information literacy; based on the social network perspective, we propose strategies to establish a long-term mechanism for smart medical operation and improve the information interaction network environment; based on the system service perspective, we propose strategies to optimize the system function design and innovate the service model.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
In order to meet the requirement of nowadays communication systems, 5th generation (5G) wireless communication requires high data rate. A millimeter-wave microstrip patch antenna designed for 5G high-frequency band is presented in this paper. The performance of antenna is modified mainly by two notches at the junction of the patch and the transmission line. Modifying the length of notch is proved to be the preferred choice for adjusting the antenna performance because of its stability in parameter regulation. In simulation, the antenna achieves the bandwidth of 767MHz, which is centered at 38GHz. The final realized gain is 7.67dBi and both radiation efficiency and total efficiency are higher than 90%. The antenna performance is also good in two-element array. The gain of main lobe increases to 10.8dBi and 3dB angular decreases from 73.2º to 27.0º. The proposed design of antenna can be used in 5G wireless applications at the frequency of 38GHz. The research of this paper can enhance the development of wireless communication technology.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
This paper introduces two kinds of commonly used modulation (Phase shift keying and Quadrature Amplitude Modulation) and four classical channel coding methods(Hamming code, Convolutional code, Turbo code, LDPC code), and uses the Communication tool box provided by MATLAB to simulate and research the performance of different modulation methods and different channel coding methods under Additive White Gaussian Noise Channel and flat rayleigh fading Channel. The results of the simulation verifies some important theories in the field of modulation and channel coding. In particular, the performance simulation of turbo codes and LDPC codes used different decoding methods under Rayleigh channel is simulated, and the research in this area is not sufficient before. Finally, this paper makes some useful suggestions for future research directions in the field of modulation and channel coding.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
Speech signal processing is one of the most quickly increasing domains of information science study, as well as a very active and popular research subject with significant academic and practical value. Voice signal processing research is vital to the disciplines of machine language, speech recognition, and speech synthesis, among others. With its strong computer capability, MATLAB software can easily finish the processing of voice signals. MATLAB may be used to analyze digitalized speech signals in the time and frequency domain, display time and frequency domain curves of speech signals, and analyze speech based on its properties. This study evaluates the impact of various filters on speech signal processing to help us better create speech coding, voice recognition, speech synthesis, and other approaches. It is based on a series of characterization and processing of speech signals using MATLAB software.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
Application of Computer Network and Algorithm Model
At present, with the further deepening of the concept of Internet +, it has become a general trend to optimize and innovate the teaching of basic Japanese courses. Therefore, it is a feasible way to build a new network teaching platform of Japanese basic course based on Internet technology. Based on the actual needs of all kinds of users in the teaching of Japanese basic course, this paper discusses the design of network teaching platform of Japanese basic course in detail from the aspects of system architecture design, database design and so on. At the same time, the related test results show that the performance of the system platform basically meets the expected requirements, and it also plays an important role in improving students’ academic performance.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
In order to improve the convergence and economy of resource scheduling on the supply side of microgrid, a multi-source scheduling method on the supply side of microgrid based on reinforcement learning algorithm is proposed. The structure of microgrid is analyzed, and the principle of reinforcement learning algorithm is given. Based on this principle, the objective function of multi-source optimal scheduling on the supply side of microgrid is designed, that is, the total operation cost of the system is the lowest, and the corresponding constraints are proposed, including the system power balance constraints and the operation constraints of energy storage battery. Based on the above established objective functions and constraints, a multi-source scheduling model on the supply side of the microgrid is constructed to maximize the operation income of the microgrid. The experimental results show that the convergence speed of this method is faster and the total operation cost of microgrid is reduced, which verifies its application value.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
The capacity of the communication network can be influenced by changing the channel allocation in various settings. Researchers are working on it to come up with useful frequency assignments. This paper analyzed the capacity of different common frequency allocation modes to discover a better solution with many users. In a large classroom, for example, pupils can seat in a regular pattern and every one of them will connect to the network. As a result, during the experiment, modulations based on standard methods were included. All simulations are aimed at determining the ideal network capacity, hence self-improving algorithm-based networks are used. The results reveal that: a) in the pure IFR situation, network capacity is determined by the cellular network specification and the integer frequency reuse factor; and b) in the mixed IFR case, network capacity is determined by the cellular network specification and the integer frequency reuse factor. b) Among all the approaches individually, FLG is the best option. c) When using multiple methods using FFR, the best scenario is tx-ITL (beta5) with FFR (10). Overall, depending on the approach used, it can function differently in a small network. It's crucial to remember, especially in network design, that even one parameter might influence the outcome.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
Ideological education is an important content of humanity quality education in colleges and universities, for higher vocational colleges to strengthen and improve ideological and formal education is a significant and urgent task of the ideological and political education work in a core position in the education work in colleges and universities, to improve the level of students' ideological and political consciousness, moral quality and cultural quality, It plays an important role to train students to be all-round talents with both political integrity and ability. The quality evaluation of ideological and political education in colleges and universities is an important link and an organic part of the ideological and political education in colleges and universities, which helps to find the deficiencies and problems in the teaching process, clarify the work direction and teaching methods that need to be improved in the teaching process, so as to continuously improve the quality of ideological and political education teaching. This paper draws on the existing research results, on the basis of ideological theory course in higher vocational colleges in view of the current targeted in this paper, the teaching evaluation model, according to the existing situation is analyzed, based on analytic hierarchy process (ahp) aims to speed up the construction of higher vocational college ideological and political theory course teaching evaluation model, to further strengthen the ideological and political theory in higher vocational teaching evaluation model of construction and progress [1].
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
In order to guarantee network security effectively and improve the performance and efficiency of computer network intrusion detection system, the matching algorithm of computer network intrusion detection system is studied. Firstly, the basic model of computer network intrusion detection is analyzed, and the multi-pattern matching algorithm of computer network intrusion detection system is proposed, which is integrated into the computer network. Then, the multi-pattern matching algorithm of computer network intrusion detection system is analyzed, and a computer network intrusion detection system based on the multi-pattern matching algorithm is designed, and the multi-pattern matching algorithm is improved to improve its effectiveness. Finally, an algorithm satisfying the requirements of computer network intrusion detection system is obtained by comparing with the conventional matching algorithm. Through the research of matching algorithm applied to computer network intrusion detection system, it shows certain social practicability.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
The importance of the aviation networks in the transportation infrastructure makes it crucial to identify the key nodes, analyze the complexity, and estimate robustness. In this paper, we propose to study the characteristics of the American aviation network structure by using the complex network theory and the Pajek application. The importance of nodes in the aviation network is ranked by degree centrality, betweenness centrality, closeness centrality, and eigenvector centrality. We designed two models, random attacks and deliberate attacks, to simulate the robustness of the aviation networks. Deliberate attacks and random attacks are measured using the number of nodes in the maximal connected subgraph and network efficiency, and four centralities are used as deliberate attack approaches. And comparing the intensity of the deliberate attacks based on four centralities. The results show that: 1) the aviation network has strong aggregation, good overall connectivity, and significant characteristics of the scale-free and small-world networks; 2) the aviation network shows strong robustness in the face of random attacks but is relatively fragile in the face of deliberate attacks. Considering the deliberate attacks, the attack ability based on betweenness centrality is the strongest and the attack ability based on eigenvector centrality is the weakest. As for the attack that is based on degree centrality and closeness centrality is in between.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
This paper analysis ZigBee network technology, security structure, encryption algorithm and other security aspects. Study the basic mode of ZigBee application, the detection based on routing redundancy algorithm, the implementation of symmetric key and the security architecture of the protocol stack, and improve its security by introducing the corresponding security management sub-layer in the application layer and network layer of the TCP/IP protocol. It also studies the security of MAC layer of ZigBee, analyzes the security mode and CCM algorithm used by the MAC layer, the security services provided and the security scheme for realizing the corresponding security services.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
Aiming at the problem that the load imbalance among multiple controllers in Software Defined Network (SDN) will lead to the degradation of the overall performance of the system, a switch migration strategy (SMTP) based on traffic prediction is proposed. The strategy takes the load of the controller and the propagation delay between the controller and the switch as the optimization goals. First, the ARIMA model is used to predict the load of the switch; secondly, the predicted load of the controller is calculated, and the controller is divided into overload controller and light load controller; finally, considering the propagation delay between the controller and the switch, the migration algorithm is used Migrate some switches of overloaded controllers to light-loaded controllers to achieve load balancing among multiple controllers. The experimental results show that the SMTP strategy can realize the load balancing of SDN multi controllers. Compared with the LUMA strategy, the response time of the controller is shortened and the performance of the network is improved.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
In the new era, digital economy has become a new economic growth point of enterprises, and data assets have been recognized and developed by more and more enterprises. By analyzing and evaluating the data, the potential of the data application can be quickly identified and effectively adjusted and optimized. This paper mainly studies the Data and Analysis system, establishes a data management model based on shipping enterprises, identify the indicators that measure the maturity level of ICM's D&M system- personnel, technology and process. We use evaluation, optimization, correlation and decision models to solve the problem, use NETLOGO to simulate, and give the results by MATLAB. Through this, to propose an improvement scheme for the original system, so as to achieve the purpose of further optimization of the system. Finally, we analyze the applicability of the model in detail by making and improving the decision tree, and point out its advantages and disadvantages.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
At the present stage, China's poverty-returning population identification mainly adopts manual identification methods, and many off-target phenomena have occurred. This paper proposes a Fuzzy C-means clustering (FCM) and random forest model for identifying the poverty-prone population to address this problem. Firstly, a multidimensional poverty identification indicator is established based on the sustainable livelihood indicator system (SLIS). Secondly, the dataset was extracted from the 2018 China Family Panel Studies (CFPS) data based on the SLIS system, and FCM was used to cluster the dataset into poor and non-poor. The high confidence poverty data were extracted as the poverty dataset. The FCM was then used to classify the poverty data into those prone to return to poverty and those who are hard to return to poverty. At the same time, random forest is used to construct an accurate identification model for the easy-to-return population on the poverty dataset. The model was evaluated using evaluation indexes such as accuracy. The results showed that the identification results of the model were consistent with the clustering results of the FCM. Finally, the random forest model was used to analyze the poverty-causing factors of the poverty-prone population data, and the main factors that cause poverty were derived.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
Port dangerous goods have the characteristics of wide variety and wide distribution. Port safety production is facing great pressure. The management of port cargo safety storage needs to be analyzed and developed by the third-party software. In view of the above situation, taking the field of hazardous chemicals as an example, this paper proposes a question and answer model of risk knowledge in the field of hazardous chemicals. It is composed of question named entity recognition module, question intention recognition module and answer query module. The question entity recognition model based on ALBERT-BiLSTM-CRF and the question intention recognition module based on ALBERT-TextCNN are adopted. Compared with the traditional single structure and classical models, better model recognition results are achieved.In the answer query module, the intention classification template of hazardous chemical risk problems is designed, Cypher query statements are designed according to the classification template, the mapping relationship between the questions and the knowledge map is established, and the graph database Neo4j is used to complete the complex query tasks
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
The data center network of smart park is hereinafter referred to as cloud network of smart park. Main research contents of smart park cloud network: overall architecture of park cloud network, physical network of park cloud network, security protection of cloud network and intelligent operation and maintenance. Design and realize a minimalist, ultra wide, safe, reliable and intelligent smart park cloud network, to solve the problems faced by the cloud network, fast business launch, network pooling and automation, security service, network reliability, application dynamic relocation, traffic surge, intelligent operation and maintenance.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
Generalized Zero-Shot Learning (GZSL) is characterized as a training process that comprises visual samples from seen classes and semantic samples from seen and unseen classes, followed by a testing process that classifies visual samples from seen and unseen classes. Existing zero-shot learning (ZSL) approaches suffer from domain shift and information loss issues as a result of class differences between visible and unseen classes, as well as uneven image distribution. In this study, a generalized zero-shot learning strategy based on dual latent space reconstruction (DLR-GZSL) is proposed. The method aims to establish a latent space of shared semantic and visual information, uses dual learning to align different modal representations to alleviate the domain shift problem, uses triplet loss to improve intra-class diversity and inter-class separability of the generated samples, and uses information bottleneck to retain as much valid generated feature information as possible to reduce information loss. Experiments on the CUB, SUN, AWA1, and AWA2 datasets reveal that the suggested method has more accurate than previous methods, demonstrating its effectiveness.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
Spatial information network has the characteristics of large spatio-temporal scale and high dynamic time-varying, so the mining of key nodes should be considered from a period of time. Based on the cumulative graph model, the spatial information network is modeled, the dynamic network model is constructed, the concept of the relevant connection path under the dynamic network is defined, and an important node analysis method based on the cumulative pattern of spatial information network is proposed, namely, important node mining. MATLAB and STK software are used to establish the real satellite simulation environment. Experimental results show that the proposed method can better mine the important nodes in the dynamic spatial information network.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
Further in order to better improve the online learning system on the student's learning status, learning level and course activity system to make a systematic monitoring design. Better improve the teaching process between teachers and students to reach a new level of level, so that teachers can better get feedback from students when awarding courses. We have also optimized and improved the online learning effect detection system based on the computer system. In the system, we have built a variety of expression recognition algorithm principles to better capture students' expressions in the classroom, so as to make the conclusions drawn by the online learning system model More authenticity and effectiveness
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
With the continuous development of computer technology and the Internet, computer network security has become a hot topic in the society. How to improve the early warning and prevention ability of computer network security and provide safe, sharing and stable online environment for Internet users is also a concern. Therefore, the focus of this study is the design of computer network security early warning system based on network behavior, combined with Internet users' network behavior to provide design ideas for computer network security early warning, with Internet users' behavior characteristics as the detection index to test the computer network security early warning system early warning performance.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
With the development of society, more and more people are interested in traditional culture. Today, traditional cultural education has become an important part of education. In order to provide a platform for people who like traditional culture to understand traditional culture, publicize traditional culture and ensure the correctness of traditional culture inheritance, this paper constructs a traditional culture learning platform based on computer system. This platform is developed and used B/S structure, which improves the efficiency of system operation and reduces the cost of system operation. The platform uses MySQL as the database, Java as the programming language, and uses the JSP technology to help the system to be applied across platforms. The platform also has user-oriented personalized recommendation, using tag-based recommendation algorithm to recommend learning resources that meet user preferences. This platform provides the public with a channel to understand traditional culture, which can bring good user experience to users and has important practical value for the inheritance of traditional culture.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
In order to optimize the investment incremental distribution strategy of power grid companies, a distribution network investment path allocation model based on investment demand and investment capacity is proposed. Starting from the multiple dimensions of investment demand, investment capacity, planning risk, market risk, management risk and economic risk, a distribution network investment path allocation management model is constructed through the multi-level grey correlation area analysis method, which provides support for the optimization of investment paths for power grid companies. Finally, the experiment proves that the distribution network investment path allocation model based on investment demand and investment capacity has high practicability and fully meets the research requirements.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
Sea clutter can affect the detection of sea targets. Traditional clutter suppression methods are difficult to detect slow - moving targets in medium-high sea conditions. Based on sparse representation theory, a novel sea clutter suppression method based on sparse low rank is proposed. It replaces traditional correlative operation with low dimensional projection measurement and signal reconstruction, and transfers a lot of computation to post processing. On the premise that the target range dimension distribution detected by radar satisfies sparsity and the sea clutter satisfies low rank, a solution m-odel is established by using the minimum power sparsity constraint and the low rank constraint of the sea clutter. The co-nvolution matrix is formed by transmitting signals, and then the measurement matrix is constructed by randomly extract-ing rows of the convolution matrix. The iterative contraction threshold algorithm is used to reconstruct the target signal. This paper gives a detailed theoretical derivation of the algorithm and forms a complete implementation framework. Si-mulation results show that the proposed algorithm can effectively reconstruct the target and achieve the sea clutter suppression and target detection under strong sea clutter background.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
In order to solve the problem of the gray wolf algorithm (GWO) in the dynamic programming of UAVs, due to the reduction of the attenuation factor, the individual wolves move to the head wolf area, resulting in poor global convergence effect and low optimization accuracy of the algorithm. A 3D cruise dynamic programming algorithm for UAVs based on the Grey Wolf (IGWO) strategy based on Levi flight and random walk strategy is proposed. Build a three-dimensional model of UAV cruise; weigh factors such as cruise trajectory length, radar area, no-fly threat, and heading change to construct a fitness function; with the help of Levi flight and random walk strategies, it is discussed to find an appropriate solution according to different optimization problems. parameters, to achieve higher-precision optimization, and to ensure the method of the optimization process in the middle and late stages; finally, the dynamic planning algorithm for UAV cruise in complex three-dimensional maps is obtained. Taking the cruise in the designated mission space as an example, the simulation verifies that the IGWO algorithm can make up for the shortcomings of GWO, and the planned path can avoid threats, and it takes time and the path length is small. The experimental results show that it is reasonable and effective to use the IGWO algorithm to perform flight missions in three-dimensional space.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
Mosaic Warfare was proposed in August 2017. In the process of researching Mosaic Warfare, Chinese scientific researchers mostly compare Mosaic Warfare and traditional warfare in a qualitative way. The class unit and connection relationship are abstracted, and its topological structure is constructed. Put forward evaluation indicators such as the number of effective combat links (NCL) and combat cost-effectiveness ratio (CCR), and compare the survivability of the Network-centric warfare system and the Mosaic Warfare system based on the number of effective combat links, and make useful explorations on the research of the Mosaic Warfare system
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
This paper focuses on the design of the 2D puzzle action game “Yin-Yang Crossing” featuring an ink wash painting style. The game is inspired by the movement of electric charges in the electric field and is dedicated to highlighting the theme of duality. Players can use W/A/S/D on the keyboard together with the left mouse button to control the yin-yang ball in the landscape for adventure. On the one hand, the concept of yin and yang is used in the visual representation of the game, and scenes featuring Chinese landscape paintings are produced, which therefore will render an unparalleled experience for players. On the other hand, this game is developed based on the Unity3D engine with C# as the script to realize the basic functions such as character movement and character force. It also uses PlayerPrefs, a class that stores persistent local data, combined with JSON files to realize the game archiving, where Singleton Pattern is adopted to achieve the data consistency between foreground and background. Besides, special effects of elements such as peach petals and bamboo leaves are created in this game through the particle system. The game test results show that “Yin-Yang Crossing” has achieved the design purpose, since its flexible calling of a variety of engine systems contributes to its sustainable play and wide prospect, thus bringing players a good all-around play experience. Eventually, this game won second place in the Chongqing site of the Global Game Jam (GGJ) China 2022.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
Design of the high-lift device, one of the key technologies of civil aircraft, enhances take-off and landing performance by increasing the circumflexion and effective area of the airfoil section while at the same time enlarging the stalling-angle in the process. As the level of the aerodynamic design of modern aircrafts improves, forms of the high-lift device are increasingly simplified with leading-edge slat and single-slot Fowler Flap used widely in civil aircraft. While ensuring aerodynamic efficiency, they also excel in reliability and overall performance with simple structures, light weight and low noise. Under the restraint of multi-targets, a high-lift device sets several units with each one measuring up to qualified aerodynamic design. In this article, optimization analysis of parameter of trailing-edge flap recession on some civil aircraft is made with conclusions verified by results of wind-tunnel tests.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.