Proceedings of the 3rd International Conference on Mechatronics Engineering and Information Technology (ICMEIT 2019)

+ Advanced search
154 articles

The Implementation of the Intelligent Family Balcony Farm System based on Android System

Qi Yan
The balcony farm system organically combines McS-52, WIFI module, temperature and humidity module, relay module and other modules to realize the monitoring of the environment by mobile phone APP. The idle balcony space can be reasonably utilized for vegetable cultivation, and precise control can be implemented...

Moving Target Detection Algorithm Combining Three-Frame Difference and Hough

Mingming Liu, Dong Pei, Haoxiang Sun, Ju Liu, Donghui Zhu
Aiming at the three-frame difference method, the moving target detection will be misdetected due to the influence of noise. A moving target detection algorithm with improved three-frame difference combined with Hough is proposed. Firstly, the background difference method based on local adaptive threshold...

Improved Statistical Interference Model for Person Re-identification

Linxuan Li
Person Re-identification problem is an important and challenging task in computer vision task. Due to the drastic appearance variation caused by misalignment and illumination changing, traditional metric models are failed in similarity measure of pedestrian images. In this paper, a novel metric learning...

Comparative Study on 5G Communication Channel Coding Technology

Sijie Cheng
The fifth-generation mobile communication network (5G) technology is a hot topic in the current mobile communication field, and the channel coding technology is the foundation to realize the reliable communication of 5G mobile system. This paper introduces the development of 5G technology and the development...

A Flat Management Platform based on Mobile Internet and Big Data

Bin Liu, Yunna Li, Jun Qi, Tao Feng, Yijie Yuan, Liang Si, Liwei Yang
In hierarchical management systems, the information interaction problems often appear such as transmission delay, ununified understanding of important matters and distortion of the original intention. At present, many people are used to using Wechat and QQ to exchange daily work information. However,...

Data Analysis Model of Machining Accuracy Measurement Technology for Machine Parts

Xiaoming Chen
The quality of mechanical products depends on the quality of mechanical parts and the assembly quality of products, and the quality of parts is the basis of assembly quality. The quality of mechanical parts is related not only to the performance of materials, but also to the accuracy of machining and...

Research on Thermocline Tracking based on Multi-AUVs Formation

Zhen Li, Yiping Li
Thermocline is of great significance to marine scientific research. Multi-autonomous underwater vehicles (AUVs) have great advantages over single autonomous underwater vehicle in ocean observation. In order to solve the multi-AUVs for Thermocline tracking problem, firstly, an AUV thermocline tracking...

Decentralized Location Privacy Protection Method of Offset Grid

Jie Ling, Junyi Xu
Location services bring convenience to people's lives, but also easily lead to the disclosure of personal privacy information. Many location privacy protection methods are based on trusted anonymous servers, but in real life, the anonymous servers are not trusted. This paper proposes a decentralized...

Research and Implementation of Multi-scene Image Semantic Segmentation based on Fully Convolutional Neural Network

Fangzhou Yu
With the rapid development of deep neural networks, image recognition and segmentation are important research issues in computer vision in recent years. This paper proposes an image semantic segmentation method based on Fully Convolutional Networks (FCN), which combines the deconvolution layer and convolutional...

A Structural Design of a Robot for Removing Bird's Nest on Power Transmission Line

Zhiwen Huang
This paper deals with the field of bird's nest cleaning equipment, in particular, a new type of bird's nest-removing robot for power transmission towers. Bird's nests are often built on the transmission and distribution network towers. The branches, grass stems, iron wire and other materials that are...

Coreness Tunable Network Model

Yifan Wang
Kitsak et al argued that nodes dwell in diverse network shells by a k-core decomposition process show more reliable identification for nodal importance which had attracted more and more attentions in different domains. But one seldom focuses on the distribution of node numbers (DNN) in different shells...

Sign Language Keyword Extraction based on GLOSS

Ruizhu Wu
In order to quickly understand the content of sign language video, the theme of handshake language, and facilitate the efficient management and retrieval of sign language corpus, the annotation corpus in the parallel corpus of the text first maps all words to one using the word2vec model based on deep...

Design of Power Wireless Private Network Coverage Prediction System

Qianke Ai, Wenjiang Feng, Weinong Wu, Yuxiang Liu, Guojin Liu, Taotao Bao
In this paper, according to the practical needs of the electric power wireless network coverage prediction, a propagation model based on real data and revised statistical prediction model (SPM) is proposed to predict the spatial field intensity distribution of the base station and improve the rationality...

A Transaction Processing Method for Distributed Database

Zhian Lin, Chi Zhang
This paper introduces the distributed transaction processing model and two-phase commit protocol, and analyses the shortcomings of the two-phase commit protocol. And then we proposed a new distributed transaction processing method which adds heartbeat mechanism into the two-phase commit protocol. Using...

Visual Navigation and Path Planning of Ball Picking Robot based on Swarm Intelligence

Zhangbao Chen
With the progress of science and technology, intelligent robot system has been applied in service industry. The research and design of service-oriented autonomous mobile robots have attracted more and more attention from enterprises and businesses. In this paper, an intelligent tennis pickup robot based...

Acoustic Signal Characteristics Analysis of Underwater Plasma Source Pulse Discharge based on Variational Mode Decomposition Algorithm

Zhenyang Chen, Bing Yan, Xiaobing Zhang
In order to study the variational mode decomposition (VMD) algorithm for the analysis of acoustic signal characteristics of underwater plasma sound source pulse discharge, a simulation model of central control module is established by using VMD algorithm. The whole hardware circuit takes the FPGA (Field...

Improved Active Disturbance Rejection Control based on PSO for a Precise Rotating Servo System

Zhenxin He, Jie Wang, Xiangyang Li, Zhili Zhang, Liang Li
The precise rotating servo system is a nonlinear system and demands on high tracking precision and stabilization, so it is difficult to achieve an ideal control result using PID control strategy. An active disturbance rejection control (ADRC) strategy is presented to guarantee the state variables of...

Simultaneous Localization and Mapping of Mobile Robot with Research and Implementation

Chen Du, Yu Du
In the process of autonomous navigation, mobile robots need to build maps of the surrounding environment and simultaneous localization. The Rao-Blackwellzed particle filter algorithm is one of the methods to efficiently solve the problem that simultaneous localization and mapping of mobile robots. At...

Parallel Non-Deterministic Planning Research

Xinyan Liu
This paper mainly introduces the theory of parallel Non-Deterministic planning domain, intelligent planning theory and a language RDDL describing the domain of parallel non-Deterministic planning. A first-order probability tree model is proposed for a specific domain, namely the semantic model of the...

A New Location Method of Touchless Knuckleprint based on Computer Vision

Xinqi Wang, Yanping Hu
The knuckleprint positioning is the key basis for the biometric recognition. This paper introduces a new location method of touchless knuckleprint based on computer vision. Firstly, in order to reduce the light impact, the RGB image is converted into YCbCr color space. We use a hybrid algorithm of elliptical...

A320 Flight Simulator Motion System Maintenance and Fault Diagnosis

Lei An, Guozhu Zhao
The from the angle of defenders of details needed to maintain the six degree of freedom motion system of a simulator of the system of institutions, driving mode and working principle of the system and other aspects of the theory of knowledge, and combine the data and maintenance practices, maintenance...

Density Peak Clustering Algorithm based on the Nearest Neighbor

Bangyu Tong
Clustering by fast search and find of density peaks is a new kind of density-based clustering algorithm, which can find the cluster center quickly and accurately by assuming that the cluster center has a high local density and is far away from other cluster centers. However, this clustering algorithm...

The Construction of the Evaluation Index System of Customer-Oriented Software Supportability

Chun Shi, Hua Zhang, Fei Ye
Information equipment has become the main body of our PLA, and software has become the soul and hub of weaponry, and software maintenance support has become one of the key elements that constrain the formation of equipment operations and support capabilities. Through the analysis of the content, steps...

Aerodynamic Measurements: Normative Data for Children Ages 15-17 Years

Jing Wang, Yonghong Li
This paper mainly selects three teenagers aged 15-17 as research subjects.Study the various parameters of the airflow and air pressure during the obstruction and de-blocking phases of the aspirated stops and non-aspirated stops of this age group.It mainly collects the expiratory airflow duration,peak...

Research on Development Strategy of Space Security based on AHP-SWOT

Shuxing Feng, Xiancheng Su, Yongping Wang
It is becoming the high topic to keep space security in the world, and it is great useful for making decision and making a choice to analyze development strategy of space security based on SWOT, with analyzing the strength, the weakness, the opportunity the threat, with qualitative estimate and quantitative...

Research on Network Intelligent Joint Operations

Yao Hu, Yaxiong Li, Hao Gu
Since the US military proposed the network-centric war, all countries in the world have focused their military theoretical research on the intelligence of the network. In view of the fact that the world has entered the era of information and networks, the joint operational model based on network intelligence...

Analysis of Statistical Characteristics of China's Aviation Full-Freight Network based on Complex Network Theory

Li Yang, Zhenzhen Zhou
With the development of air freight, the emergence of specialized freight airports, the gradual increase of full-freight airlines. The full-freight network has a great influence on the development of air freight, so it is necessary to carry out a more comprehensive analysis of the air full-freight network....

Train Timetable Optimization for Metro Lines Connecting to Airport

Jinwei Lu, Yun Bai, Jiajie Li
Due to the advantages of huge capacity and reliable service, metro plays an important role in transporting airport passengers. It is known that train timetable has a direct impact on passenger waiting time which affects the service level of airport express. This paper first analyzes the behavior characteristics...

Recognition Method of Urban Residents' Travel Mode based on GPS Data

Huabin Liu, Chunfu Shao
The rising of big data and the Internet has brought about tremendous changes in travel. The rapid development of computer technology, network technology, wireless communication technology, portable devices, and location-based services provides an opportunity for the application of GPS technology to travel...

Design of IoT Web Server Communication Platform based on Netty and WebSocket

Xiongfei Liu, Jiakang Liu, Beiping Liao, Yunyi Zhu, Huimin Liu
With the development of the Internet, in the home, medical, transportation and other aspects of the Internet of Things large-scale application, more and more IoT gateways are connected to the cloud. Users interact with the Internet of Things gateway through the Internet of Things web server. The traditional...

Research on High-speed Railway Fare Optimization based on Change of Passenger Flow

Jie Zhang, Xiangfei Yang, Gu Du
In recent years, high-speed railway has gradually become an indispensable choice for people to travel. This paper studies high-speed railway fares to increase the benefits of high-speed rail and achieve long-term sustainable development of the railway sector. According to the characteristics of demand,...

Prediction Model of Expressway Natural Risk Loss

Bo Wang, Yanping Zhou, Yufeng Bi, Qiangqiang Jing, Qiangmin Zhang, Jie Song
Natural risks of expressway remain an important part of its operation risks. However, due to the variety, universality, locality and suddenness of natural risks, the prediction of expressway natural risks is difficult to forecast and control. In this paper, the expressway natural risk loss prediction...

Study of User Behavior Data Mining and Applications in University Libraries --Taking the Central China Normal University Library as an example

Rong Xu, Yi Yang
Through analysis of various data types generated from the library of Central China Normal University, such as admission data, borrowing data, digital library utilization data, and consulting service data, we explore the correlation information, value and improvement of library daily work and service....

Python-based Visual Recognition Classroom

Mingqi Jiang
This is a system based on Python technology to identify the seat. First,I use Python-programmed camera to capture multiple regions at the same time and preprocess the image, then transfer the data to the server through the transmission. Here we also use Python. The technology built a Django server, Django...

A Review of Network Compression based on Deep Network Pruning

Jie Yu, Sheng Tian
In recent years, the deep network has made considerable achievements in the field of computer vision and gradually becomes a hot research topic. The performance of the deep network is very good, however, due to its large size of parameters, high storage, and computational cost, it is hard to deploy the...

Discussion on Computer Information Processing based on Big Data Era

Feipeng Jia, Dongdong He
In order to give full play to the role of computer information processing technology in the era of big data and ensure data security, a relevant analysis of computer processing technology is made. In addition, the definition of computer information processing technology is given, and the basic functions...

The Practice and Exploration of Virtual Roaming based on 3Ds Max

Zhanzhan Duan
This paper focuses to build a completely immersive campus roaming system with taking Shanghai Technician School as the object of 3D virtual roaming system by using 3Ds Max and Quest 3D platform as development tools, combining WebGL and threes.js library programming language, and integrating with HTML5...

Application of Virtual Reality in Interior Decoration

Lin Wang, Hao Zhou, Anqing Xu, Bin Xue, Mengqian Li, Haoliang Chu
We analyze the application prospect of VR technology in interior decoration, discuss how to use VR technology to make consumers better experience more convenient and independent decoration mode, and point out that the core of VR technology in interior decoration is the establishment of database in this...

Research on Comprehensive Analysis Method of Stock KDJ Index based on K-means Clustering

Baoyu Ding, Ling Li, Yunliang Zhu, Hui Liu, Junfeng Bao, Zezhu Yang
This paper proposed a K-means measure to cluster stocks, and predicted the investment of strong profitability objects through comprehensive analysis of KDJ indicators. The paper analyzed the clustering hierarchy diagram, as well as the inter-cluster similarity structure diagram of different cluster numbers....

Encryption Technology in Information System Security

Siliang Suo, Wei Xi, Tiantian Cai, Ganyang Jian, Hao Yao, Jin Li
With the rapid development of network, all kinds of information systems bring convenience to enterprises at the same time, it also brings more and more hidden dangers to information security. Encryption technology is the core technology of network security technology, which plays an increasingly important...

CFDL Model-Free Adaptive Control Background Image Extraction to Video

Di Lu
Video background image extraction plays a key role in target detection, and traditional background image extraction methods are easy to cause model distortion. In this paper, using the idea of model free adaptive control, a compact form dynamic linearization method is established to extract the video...

Research on Human-Computer Interaction Technology based on Visual User Gesture Recognition

Jianfeng Liao, Qun Zhang, Jianping You
This paper deeply discusses the general situation, background and application of human-computer interaction, and proposes a new exploration-one-hand gesture recognition in human-computer interaction mode, and discusses the main research techniques in detail and comprehensively. The basic framework of...

Ping Pong Motion Recognition based on Smart Watch

Zengjun Fu, Kuang-I Shu, Heng Zhang
Smart watches have become one of the most representative devices in wearable devices because of their unique advantages such as integration, portability, reliability, stability, universality and low environmental dependence. At present, it is mainly used for the monitoring of health indicators such as...

Power Allocation in Massive MIMO System with Energy Harvesting Base Station

Guomin Li, Ning Li, Lihua Pang
This paper studies a resource allocation method based on power optimization for single-cell multi-user downlink Massive MIMO wireless communication system with energy harvesting function. The proposed method uses a ZF precede for precoding. Under the premise that the non-causal knowledge of the energy...

A Mobile Recommendation Algorithm based on Location Information and Collaborative Filtering

Suming Li
Aiming to the problems of information overload and low recommendation quality for O2O electricity field, this paper has put forward to a mobile recommendation algorithm based on location information and collaborative filter, which introduces the location information in mobile recommendation algorithm,...

Lane Line Detection based on Mask R-CNN

Bin Liu, Hongzhe Liu, Jiazheng Yuan
Lane detection plays an important role in driverless system. However, the complexity of the actual road environment makes lane detection more challenging. In recent years, the rapid development of deep learning has pointed out the direction to solve this problem. Deep learning does not care about the...

BP Neural Network-based Model for Evaluating User Interfaces of Human-computer Interaction System

Ruixin Chen, Na Lin, Jin Su, Yanjun Shi
Human-computer interaction system is the medium for human and computer. The rationality and intelligence of its design directly affect the work efficiency and execution ability of relevant practitioners. Traditional human-computer interaction evaluation usually adopts expert evaluation method. This method...

Urban Traffic Flow Fore-casting based on Deep Learning Model

Shengdong Mou, Zhengxian Xiong
Short-term traffic flow forecasting is very important for realizing urban intelligent traffic system. In the past, many neural network models have been proposed to predict traffic flow, but the effect was not very significant. The reason is that most of them are based on shallow model learning and they...

Harmonic Response Analysis of Groove Vibration Polishing Machine

Xin Gao, Yixuan Xiao
The groove vibration polishing machine is made of Q235A. The allowable stress value is given by the yield limit. Its value is sigma s=235MPa.The harmonic response analysis of groove vibration polishing machine is to analyze the deformation and stress distribution of the tank body under different frequencies...

Research and Application of the Intelligent Perceptive IOT Architecture for Aerospace Experiment Business Network

Hongyan Chen, Junwei Wan, Wensu Li
Based on the analysis of the current situation and requirements of the aerospace business network, faced with the emerging intelligent perception IOT system, the shortcomings of the existing aerospace business network, especially the inadequacies of the existing architecture, are summarized and analyzed,...