首页 > 最新文献

2020 2nd International Conference on Information Technology and Computer Application (ITCA)最新文献

英文 中文
Comprehensive evaluation and analysis of the culture of mining and metallurgy enterprises by combining the spherical network structure model constructed by the calculation algorithm 结合计算算法构建的球形网络结构模型,对矿冶企业文化进行综合评价与分析
Qing-xian Zhao
Choosing a more scientific evaluation system can evaluate the cultural construction of an enterprise reasonably. With the development of science and technology, the integration of computers in all fields of various industries is inseparable. Computer algorithms play an irreplaceable role in building various models. Mining and metallurgical enterprises have their own particularities. It is of theoretical and practical value to construct a system that can comprehensively evaluate mining and metallurgy culture through the processing of computer algorithms. Therefore, based on the characteristics of mining and metallurgy culture, this paper takes the corporate culture construction of China Pingmei Shenma Group as the research object and conducts a comprehensive evaluation. After comprehensive evaluation, two conclusions are drawn: one is that the cultural construction of the enterprise is relatively good; the other is that the spherical network structure model is verified to be feasible in the evaluation of cultural enterprise.
选择较为科学的评价体系,可以对企业文化建设进行合理的评价。随着科学技术的发展,计算机在各行业各个领域的集成是分不开的。计算机算法在构建各种模型中发挥着不可替代的作用。矿冶企业有其自身的特殊性。通过计算机算法的处理,构建一个能够对矿冶文化进行综合评价的系统,具有一定的理论和实用价值。因此,本文基于矿冶文化的特点,以中国平美神马集团的企业文化建设为研究对象,进行了综合评价。综合评价后得出两个结论:一是企业文化建设相对较好;二是验证了球形网络结构模型在文化企业评价中的可行性。
{"title":"Comprehensive evaluation and analysis of the culture of mining and metallurgy enterprises by combining the spherical network structure model constructed by the calculation algorithm","authors":"Qing-xian Zhao","doi":"10.1109/ITCA52113.2020.00034","DOIUrl":"https://doi.org/10.1109/ITCA52113.2020.00034","url":null,"abstract":"Choosing a more scientific evaluation system can evaluate the cultural construction of an enterprise reasonably. With the development of science and technology, the integration of computers in all fields of various industries is inseparable. Computer algorithms play an irreplaceable role in building various models. Mining and metallurgical enterprises have their own particularities. It is of theoretical and practical value to construct a system that can comprehensively evaluate mining and metallurgy culture through the processing of computer algorithms. Therefore, based on the characteristics of mining and metallurgy culture, this paper takes the corporate culture construction of China Pingmei Shenma Group as the research object and conducts a comprehensive evaluation. After comprehensive evaluation, two conclusions are drawn: one is that the cultural construction of the enterprise is relatively good; the other is that the spherical network structure model is verified to be feasible in the evaluation of cultural enterprise.","PeriodicalId":103309,"journal":{"name":"2020 2nd International Conference on Information Technology and Computer Application (ITCA)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116951687","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on Stock Price Prediction Method Based on Deep Learning 基于深度学习的股票价格预测方法研究
Dong Liu, Ang Chen, Juanjuan Wu
The future trend prediction of time series represented by stock price has always been a key research topic in the field of data science. The rapid development of deep learning makes the analysis and prediction of time series enter a new stage. Deep learning algorithm represented by deep neural network can effectively overcome the shortcomings of traditional time series analysis methods. This paper first introduces the principle and structure of the recurrent neural network (RNN) model in the deep neural network. In view of the problem that the gradient vanishes easily and cannot effectively analyze the long sequence data, this paper introduces the gating structure to improve the hidden layer of the RNN, so as to construct the long short-term memory (LSTM) neural network model. In this paper, the LSTM neural network model is applied to the stock price prediction, and the prediction results are compared with the RNN model. The experimental results show that the error value of the LSTM neural network model is smaller than that of the RNN model, and has better prediction effect. Therefore, the LSTM neural network model is more suitable for the prediction of stock price.
以股票价格为代表的时间序列的未来趋势预测一直是数据科学领域的一个重点研究课题。深度学习的快速发展使时间序列的分析与预测进入了一个新的阶段。以深度神经网络为代表的深度学习算法可以有效克服传统时间序列分析方法的不足。本文首先介绍了深度神经网络中递归神经网络(RNN)模型的原理和结构。针对梯度容易消失,不能有效分析长序列数据的问题,本文引入门通结构来改进RNN的隐藏层,从而构建长短期记忆(LSTM)神经网络模型。本文将LSTM神经网络模型应用于股票价格预测,并将预测结果与RNN模型进行了比较。实验结果表明,LSTM神经网络模型的误差值小于RNN模型,具有更好的预测效果。因此,LSTM神经网络模型更适合于股票价格的预测。
{"title":"Research on Stock Price Prediction Method Based on Deep Learning","authors":"Dong Liu, Ang Chen, Juanjuan Wu","doi":"10.1109/ITCA52113.2020.00022","DOIUrl":"https://doi.org/10.1109/ITCA52113.2020.00022","url":null,"abstract":"The future trend prediction of time series represented by stock price has always been a key research topic in the field of data science. The rapid development of deep learning makes the analysis and prediction of time series enter a new stage. Deep learning algorithm represented by deep neural network can effectively overcome the shortcomings of traditional time series analysis methods. This paper first introduces the principle and structure of the recurrent neural network (RNN) model in the deep neural network. In view of the problem that the gradient vanishes easily and cannot effectively analyze the long sequence data, this paper introduces the gating structure to improve the hidden layer of the RNN, so as to construct the long short-term memory (LSTM) neural network model. In this paper, the LSTM neural network model is applied to the stock price prediction, and the prediction results are compared with the RNN model. The experimental results show that the error value of the LSTM neural network model is smaller than that of the RNN model, and has better prediction effect. Therefore, the LSTM neural network model is more suitable for the prediction of stock price.","PeriodicalId":103309,"journal":{"name":"2020 2nd International Conference on Information Technology and Computer Application (ITCA)","volume":"89 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115083752","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Surface Defect Detection Methods Based on Deep Learning: a Brief Review 基于深度学习的表面缺陷检测方法综述
Guanlin Liu
Surface defect detection techniques based on deep learning have been widely used in various industrial scenarios. This paper reviews the latest works on deep learning-based surface defect detection methods. They are classified into three categories: full-supervised learning model method, unsupervised learning model method, and other methods. The typical methods are further subdivided and compared. The advantages and disadvantages of these methods and their application scenarios are summarized. This paper analyzes three key issues in surface defect detection and introduces common data sets for industrial surface defects. Finally, the future development trend of surface defect detection is predicted.
基于深度学习的表面缺陷检测技术已广泛应用于各种工业场景。本文综述了基于深度学习的表面缺陷检测方法的最新研究进展。它们分为三大类:全监督学习模型方法、无监督学习模型方法和其他方法。对典型方法进行了进一步细分和比较。总结了这些方法的优缺点及其应用场景。分析了表面缺陷检测中的三个关键问题,介绍了工业表面缺陷的常用数据集。最后,对表面缺陷检测的未来发展趋势进行了预测。
{"title":"Surface Defect Detection Methods Based on Deep Learning: a Brief Review","authors":"Guanlin Liu","doi":"10.1109/ITCA52113.2020.00049","DOIUrl":"https://doi.org/10.1109/ITCA52113.2020.00049","url":null,"abstract":"Surface defect detection techniques based on deep learning have been widely used in various industrial scenarios. This paper reviews the latest works on deep learning-based surface defect detection methods. They are classified into three categories: full-supervised learning model method, unsupervised learning model method, and other methods. The typical methods are further subdivided and compared. The advantages and disadvantages of these methods and their application scenarios are summarized. This paper analyzes three key issues in surface defect detection and introduces common data sets for industrial surface defects. Finally, the future development trend of surface defect detection is predicted.","PeriodicalId":103309,"journal":{"name":"2020 2nd International Conference on Information Technology and Computer Application (ITCA)","volume":"120 1-3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123574956","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Research on Performance Optimization for Sparse Matrix-Vector Multiplication in Multi/Many-core Architecture 多核/多核架构下稀疏矩阵向量乘法性能优化研究
Qihan Wang, Mingliang Li, J. Pang, Dixia Zhu
Sparse matrix vector multiplication is an important and commonly used computing kernel in scientific computing. Irregular arrangement of non zeros in sparse matrix leads to irregular memory access pattern, which in turn affects the running speed. In the past ten years, there have been many optimization methods of sparse matrix vector multiplication based on different ideas and techniques. In this paper, the commonly used performance optimization techniques of sparse matrix vector multiplication in multi/many-core architecture are comprehensively investigated. We classify technical methods according to their common characteristics, and discuss the problems encountered by researchers of various methods. In addition, We provide a typical large sparse matrix set for testing. This paper also provides a theoretical basis for our subsequent sparse matrix calculation in Sunway TaihuLight archiecture.
稀疏矩阵向量乘法是科学计算中重要而常用的计算核。稀疏矩阵中非零的不规则排列导致内存访问模式不规则,进而影响运行速度。近十年来,基于不同的思想和技术,出现了许多稀疏矩阵向量乘法的优化方法。本文对稀疏矩阵矢量乘法在多核/多核架构中常用的性能优化技术进行了全面的研究。根据技术方法的共同特点对其进行分类,并讨论了各种技术方法研究人员遇到的问题。此外,我们还提供了一个典型的大型稀疏矩阵集进行测试。本文也为我们后续在神威太湖之光建筑中的稀疏矩阵计算提供了理论基础。
{"title":"Research on Performance Optimization for Sparse Matrix-Vector Multiplication in Multi/Many-core Architecture","authors":"Qihan Wang, Mingliang Li, J. Pang, Dixia Zhu","doi":"10.1109/ITCA52113.2020.00081","DOIUrl":"https://doi.org/10.1109/ITCA52113.2020.00081","url":null,"abstract":"Sparse matrix vector multiplication is an important and commonly used computing kernel in scientific computing. Irregular arrangement of non zeros in sparse matrix leads to irregular memory access pattern, which in turn affects the running speed. In the past ten years, there have been many optimization methods of sparse matrix vector multiplication based on different ideas and techniques. In this paper, the commonly used performance optimization techniques of sparse matrix vector multiplication in multi/many-core architecture are comprehensively investigated. We classify technical methods according to their common characteristics, and discuss the problems encountered by researchers of various methods. In addition, We provide a typical large sparse matrix set for testing. This paper also provides a theoretical basis for our subsequent sparse matrix calculation in Sunway TaihuLight archiecture.","PeriodicalId":103309,"journal":{"name":"2020 2nd International Conference on Information Technology and Computer Application (ITCA)","volume":"22 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115574119","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cell proliferation detection based on deep learning 基于深度学习的细胞增殖检测
Hao Wang, X. Lv, Guohua Wu, Guodong Lv, Xiangxiang Zheng
Cell proliferation level is important in clinical diagnosis. Analysis of cell proliferation level can help to judge the development trend of patient's condition, which is helpful for diagnosis. In order to evaluate the level of cell proliferation, it is necessary to calculate the number and proportion of proliferating nuclei. However, when the number of nuclei is large, it will bring a great pressure on doctors, and the accuracy rate will also decline. To solve these problems, this paper proposes a scheme for automatic detection and counting of cell nuclei, which is large in number and densely distributed. Our dataset is obtained from mouse liver cells, a total of 136 samples, each containing 100-300 nuclei and the proliferation of nuclei are stained by immunohistochemical staining, of which 120 are trained using convolution neural network and 16 samples are tested to evaluate the effects of the models. Three models were trained by RetinaNet with backbone networks of Vgg6, ResNet50 and ResNet101 respectively, and compared with Image Pro Plus 6.0. Experiments show that our models achieve higher accuracy compared with 67.2% obtained by manual using Image-Pro Plus 6.0 for detection and counting. It can be seen that in terms of detection accuracy, our models are better than the analysis software widely used in hospitals, effectively solving the problems of long manual detection time and low accuracy. It can effectively help doctors to evaluate the level of cell proliferation, and then quickly make a corresponding diagnosis.
细胞增殖水平对临床诊断具有重要意义。细胞增殖水平的分析有助于判断患者病情的发展趋势,有助于诊断。为了评价细胞的增殖水平,有必要计算增殖细胞核的数量和比例。但是,当细胞核数量较大时,会给医生带来很大的压力,准确率也会下降。针对这些问题,本文提出了一种数量多、分布密的细胞核自动检测与计数方案。我们的数据集来自小鼠肝细胞,共136个样本,每个样本含有100-300个细胞核,并通过免疫组织化学染色对细胞核的增殖进行染色,其中120个样本使用卷积神经网络进行训练,16个样本进行测试以评估模型的效果。用retanet分别以Vgg6、ResNet50和ResNet101骨干网训练3个模型,并与Image Pro Plus 6.0进行比较。实验表明,与使用Image-Pro Plus 6.0手动检测和计数的67.2%相比,我们的模型具有更高的准确率。可以看出,在检测精度方面,我们的模型优于医院广泛使用的分析软件,有效地解决了人工检测时间长、准确率低的问题。它可以有效地帮助医生评估细胞增殖水平,然后快速做出相应的诊断。
{"title":"Cell proliferation detection based on deep learning","authors":"Hao Wang, X. Lv, Guohua Wu, Guodong Lv, Xiangxiang Zheng","doi":"10.1109/ITCA52113.2020.00051","DOIUrl":"https://doi.org/10.1109/ITCA52113.2020.00051","url":null,"abstract":"Cell proliferation level is important in clinical diagnosis. Analysis of cell proliferation level can help to judge the development trend of patient's condition, which is helpful for diagnosis. In order to evaluate the level of cell proliferation, it is necessary to calculate the number and proportion of proliferating nuclei. However, when the number of nuclei is large, it will bring a great pressure on doctors, and the accuracy rate will also decline. To solve these problems, this paper proposes a scheme for automatic detection and counting of cell nuclei, which is large in number and densely distributed. Our dataset is obtained from mouse liver cells, a total of 136 samples, each containing 100-300 nuclei and the proliferation of nuclei are stained by immunohistochemical staining, of which 120 are trained using convolution neural network and 16 samples are tested to evaluate the effects of the models. Three models were trained by RetinaNet with backbone networks of Vgg6, ResNet50 and ResNet101 respectively, and compared with Image Pro Plus 6.0. Experiments show that our models achieve higher accuracy compared with 67.2% obtained by manual using Image-Pro Plus 6.0 for detection and counting. It can be seen that in terms of detection accuracy, our models are better than the analysis software widely used in hospitals, effectively solving the problems of long manual detection time and low accuracy. It can effectively help doctors to evaluate the level of cell proliferation, and then quickly make a corresponding diagnosis.","PeriodicalId":103309,"journal":{"name":"2020 2nd International Conference on Information Technology and Computer Application (ITCA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115717948","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Secure Transmission Strategy of Network Communication layer Relay based on Satellite Transmission 基于卫星传输的网络通信层中继安全传输策略
Liu Xu
In recent years, the continuous development of wireless communication technology has brought great convenience to people’s work and life. However, due to the openness of the wireless channel, the information is vulnerable to eavesdropping and interference from illegal users in the process of transmission. As usual, the security of information and information is guaranteed by the high-level encryption system, but with the increasing strength of the computing power of computers, the traditional encryption system has not been fully implemented which cannot meet the security requirements of the current wireless communication network. With the development of information technology, satellite communication has been widely used, especially in the military field. However, with the increasingly severe and complex military struggle, higher requirements are put forward for the security and anti-jamming capability of satellite communications. In the satellite communication support and training, we often find that once the polarization angle of the antenna feed module changes, the signal intensity also changes. At the same time, in order to solve the problem that the trust information of both sides of the ship data transmission method is lost in the case of a large amount of data, which leads to the abnormal security of data transmission, this paper studies the application of network security encryption technology in warship data transmission. Through the chaotic map transformation to update the key value in the register, the wheel key component is obtained. Then based on which the network transmission encryption algorithm is designed, the encryption of each data transmission is realized through iterative calculation. And the secure communication protocol of data transmission is designed at the same time. The information of both parties is exchanged before transmission, the two-way identity authentication is realized, and the ship data is transmitted after the authentication is completed. The polarization characteristic of the signal has a good performance in the nonlinear response of the device, the alleviation of the shortage of spectrum resources, anti-interference and so on.
近年来,无线通信技术的不断发展给人们的工作和生活带来了极大的便利。然而,由于无线信道的开放性,信息在传输过程中容易受到非法用户的窃听和干扰。通常,信息和信息的安全是由高级加密系统来保证的,但是随着计算机计算能力的不断增强,传统的加密系统并没有得到充分的实现,已经不能满足当前无线通信网络的安全要求。随着信息技术的发展,卫星通信得到了广泛的应用,特别是在军事领域。然而,随着军事斗争的日益严峻和复杂,对卫星通信的安全和抗干扰能力提出了更高的要求。在卫星通信保障和训练中,我们经常发现,一旦天馈模块的极化角发生变化,信号强度也会发生变化。同时,为了解决在数据量较大的情况下船舶数据传输方式双方信任信息丢失,导致数据传输安全性异常的问题,本文研究了网络安全加密技术在军舰数据传输中的应用。通过混沌映射变换更新寄存器中的键值,得到轮毂键分量。然后在此基础上设计了网络传输加密算法,通过迭代计算实现了每次数据传输的加密。同时设计了数据传输的安全通信协议。传输前交换双方信息,实现双向身份认证,认证完成后传输船舶数据。信号的极化特性在器件的非线性响应、缓解频谱资源短缺、抗干扰等方面都有良好的表现。
{"title":"Secure Transmission Strategy of Network Communication layer Relay based on Satellite Transmission","authors":"Liu Xu","doi":"10.1109/itca52113.2020.00064","DOIUrl":"https://doi.org/10.1109/itca52113.2020.00064","url":null,"abstract":"In recent years, the continuous development of wireless communication technology has brought great convenience to people’s work and life. However, due to the openness of the wireless channel, the information is vulnerable to eavesdropping and interference from illegal users in the process of transmission. As usual, the security of information and information is guaranteed by the high-level encryption system, but with the increasing strength of the computing power of computers, the traditional encryption system has not been fully implemented which cannot meet the security requirements of the current wireless communication network. With the development of information technology, satellite communication has been widely used, especially in the military field. However, with the increasingly severe and complex military struggle, higher requirements are put forward for the security and anti-jamming capability of satellite communications. In the satellite communication support and training, we often find that once the polarization angle of the antenna feed module changes, the signal intensity also changes. At the same time, in order to solve the problem that the trust information of both sides of the ship data transmission method is lost in the case of a large amount of data, which leads to the abnormal security of data transmission, this paper studies the application of network security encryption technology in warship data transmission. Through the chaotic map transformation to update the key value in the register, the wheel key component is obtained. Then based on which the network transmission encryption algorithm is designed, the encryption of each data transmission is realized through iterative calculation. And the secure communication protocol of data transmission is designed at the same time. The information of both parties is exchanged before transmission, the two-way identity authentication is realized, and the ship data is transmitted after the authentication is completed. The polarization characteristic of the signal has a good performance in the nonlinear response of the device, the alleviation of the shortage of spectrum resources, anti-interference and so on.","PeriodicalId":103309,"journal":{"name":"2020 2nd International Conference on Information Technology and Computer Application (ITCA)","volume":"100 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122677353","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Simulation design of an X-band high isolation circulator x波段高隔离环行器的仿真设计
Haiping Ren, Yongjun Xie
In this paper, a X-band waveguide circulator operating at 11 to 13 GHz is designed. The parameters of the circulator are optimized by HFSS (high-frequency electromagnetic simulation software). Isolation is a key indicator of the circulator. The simulation results show that the isolation of the circulator in the working frequency band is greater than 30dB, and the relative bandwidth exceeds 16%. In addition, the voltage standing wave ratios of the three ports are all less than 1.1. Therefore, the circulator presented in this paper can provide a reference scheme for the design of high isolation circulator.
本文设计了一种工作在11 ~ 13ghz的x波段波导环行器。利用高频电磁仿真软件HFSS对环行器参数进行了优化。隔离是环行器的一个关键指标。仿真结果表明,该环行器在工作频段的隔离度大于30dB,相对带宽超过16%。此外,三个端口的电压驻波比均小于1.1。因此,本文提出的环行器可为高隔离环行器的设计提供参考方案。
{"title":"Simulation design of an X-band high isolation circulator","authors":"Haiping Ren, Yongjun Xie","doi":"10.1109/ITCA52113.2020.00087","DOIUrl":"https://doi.org/10.1109/ITCA52113.2020.00087","url":null,"abstract":"In this paper, a X-band waveguide circulator operating at 11 to 13 GHz is designed. The parameters of the circulator are optimized by HFSS (high-frequency electromagnetic simulation software). Isolation is a key indicator of the circulator. The simulation results show that the isolation of the circulator in the working frequency band is greater than 30dB, and the relative bandwidth exceeds 16%. In addition, the voltage standing wave ratios of the three ports are all less than 1.1. Therefore, the circulator presented in this paper can provide a reference scheme for the design of high isolation circulator.","PeriodicalId":103309,"journal":{"name":"2020 2nd International Conference on Information Technology and Computer Application (ITCA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130270075","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Control of DC Grid for Fault Current Limiting and System Fast Recovery 直流电网限流控制与系统快速恢复
Shu Zhang, Hanchen Li, Huajing Li, Huadong Li, Wanli Zhang, Yingbei Fang
DC circuit breaker is one of the alternatives for clearing DC faults in flexible DC power grids, and its cost is closely related to its volume and its breaking current. In this paper, starting from the level of reducing the breaking fault current of the DC circuit breaker (DCCB), a dual adaptive controller suitable for MMC fault current limiting and rapid system recovery is designed. By adjusting the reference value of the MMC DC voltage and the capacitor voltage of the bridge arm sub-module, the development speed of the fault current can be automatically limited, and the system recovery after the fault can be accelerated. The design method and structure of the dual adaptive controller are introduced, and the mechanism of action is theoretically analyzed.
直流断路器是柔性直流电网中清除直流故障的替代方案之一,其成本与其体积和分断电流密切相关。本文从减小直流断路器分断故障电流的层面出发,设计了一种适用于MMC故障限流和系统快速恢复的双自适应控制器。通过调整MMC直流电压参考值和桥臂子模块的电容电压,可以自动限制故障电流的发展速度,加快故障后的系统恢复。介绍了双自适应控制器的设计方法和结构,并从理论上分析了其作用机理。
{"title":"Control of DC Grid for Fault Current Limiting and System Fast Recovery","authors":"Shu Zhang, Hanchen Li, Huajing Li, Huadong Li, Wanli Zhang, Yingbei Fang","doi":"10.1109/ITCA52113.2020.00076","DOIUrl":"https://doi.org/10.1109/ITCA52113.2020.00076","url":null,"abstract":"DC circuit breaker is one of the alternatives for clearing DC faults in flexible DC power grids, and its cost is closely related to its volume and its breaking current. In this paper, starting from the level of reducing the breaking fault current of the DC circuit breaker (DCCB), a dual adaptive controller suitable for MMC fault current limiting and rapid system recovery is designed. By adjusting the reference value of the MMC DC voltage and the capacitor voltage of the bridge arm sub-module, the development speed of the fault current can be automatically limited, and the system recovery after the fault can be accelerated. The design method and structure of the dual adaptive controller are introduced, and the mechanism of action is theoretically analyzed.","PeriodicalId":103309,"journal":{"name":"2020 2nd International Conference on Information Technology and Computer Application (ITCA)","volume":"115 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121380270","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Secure Routing Algorithm Based on Trust Value for Micro-nano Satellite Network 基于信任值的微纳卫星网络安全路由算法
Yuanming Ding, Yu Zhao, Ran Zhang
With the increasing application of micro-nano satellite network, it is extremely vulnerable to the influence of internal malicious nodes in the practical application process. However, currently micro-nano satellite network still lacks effective means of routing security protection. In order to solve this problem, combining with the characteristics of limited energy and computing capacity of micro-nano satellite nodes, this research proposes a secure routing algorithm based on trust value. First, the trust value of the computing node is synthesized, and then the routing path is generated by combining the trust value of the node with the AODV routing algorithm. Simulation results show that the proposed MNS-AODV routing algorithm can effectively resist the influence of internal malicious nodes on data transmission, and it can reduce the packet loss rate and average energy consumption.
随着微纳卫星网络应用的不断增加,在实际应用过程中极易受到内部恶意节点的影响。然而,目前微纳卫星网络仍然缺乏有效的路由安全保护手段。为了解决这一问题,结合微纳卫星节点能量和计算能力有限的特点,本研究提出了一种基于信任值的安全路由算法。首先综合计算节点的信任值,然后将节点的信任值与AODV路由算法结合生成路由路径。仿真结果表明,所提出的MNS-AODV路由算法能够有效抵御内部恶意节点对数据传输的影响,降低丢包率和平均能耗。
{"title":"A Secure Routing Algorithm Based on Trust Value for Micro-nano Satellite Network","authors":"Yuanming Ding, Yu Zhao, Ran Zhang","doi":"10.1109/ITCA52113.2020.00056","DOIUrl":"https://doi.org/10.1109/ITCA52113.2020.00056","url":null,"abstract":"With the increasing application of micro-nano satellite network, it is extremely vulnerable to the influence of internal malicious nodes in the practical application process. However, currently micro-nano satellite network still lacks effective means of routing security protection. In order to solve this problem, combining with the characteristics of limited energy and computing capacity of micro-nano satellite nodes, this research proposes a secure routing algorithm based on trust value. First, the trust value of the computing node is synthesized, and then the routing path is generated by combining the trust value of the node with the AODV routing algorithm. Simulation results show that the proposed MNS-AODV routing algorithm can effectively resist the influence of internal malicious nodes on data transmission, and it can reduce the packet loss rate and average energy consumption.","PeriodicalId":103309,"journal":{"name":"2020 2nd International Conference on Information Technology and Computer Application (ITCA)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126330055","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Research on aerospace data transaction platform and method based on blockchain 基于区块链的航天数据交易平台与方法研究
Wu Dan, Li Yin, Wang Yeying, Wang Rui, Fan Chen, Zhang Zhongyang, Hu Dongdong, Guo Liang
This article authorizes all relevant participants to join the private blockchain network and form a stakeholder alliance to jointly maintain the operation of the blockchain. It not only ensures the legal compliance of the participants in the transaction system, increases mutual trust between the participants, but also provides an open and collaborative environment, and realizes the benign circulation of aerospace industry resources. The data transaction method in this article covers the entire life cycle process of data production and transaction, and uses blockchain technology to ensure data credibility, data security, and transaction traceability. It solves the problems of proof of the value of aerospace test data, data security and network transaction trust, protects the interests of both parties in the transaction, and effectively expands the application scope of aerospace industry resources.
本文授权所有相关参与者加入私有区块链网络,形成利益相关者联盟,共同维护区块链的运营。它既保证了交易系统参与者的合法合规性,增加了参与者之间的相互信任,又提供了一个开放协作的环境,实现了航天产业资源的良性循环。本文的数据交易方法涵盖了数据生产和交易的整个生命周期过程,采用区块链技术保证了数据的可信度、数据的安全性和交易的可追溯性。解决了航天试验数据价值证明、数据安全、网络交易信任等问题,保护了交易双方的利益,有效拓展了航天产业资源的应用范围。
{"title":"Research on aerospace data transaction platform and method based on blockchain","authors":"Wu Dan, Li Yin, Wang Yeying, Wang Rui, Fan Chen, Zhang Zhongyang, Hu Dongdong, Guo Liang","doi":"10.1109/ITCA52113.2020.00092","DOIUrl":"https://doi.org/10.1109/ITCA52113.2020.00092","url":null,"abstract":"This article authorizes all relevant participants to join the private blockchain network and form a stakeholder alliance to jointly maintain the operation of the blockchain. It not only ensures the legal compliance of the participants in the transaction system, increases mutual trust between the participants, but also provides an open and collaborative environment, and realizes the benign circulation of aerospace industry resources. The data transaction method in this article covers the entire life cycle process of data production and transaction, and uses blockchain technology to ensure data credibility, data security, and transaction traceability. It solves the problems of proof of the value of aerospace test data, data security and network transaction trust, protects the interests of both parties in the transaction, and effectively expands the application scope of aerospace industry resources.","PeriodicalId":103309,"journal":{"name":"2020 2nd International Conference on Information Technology and Computer Application (ITCA)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126484956","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2020 2nd International Conference on Information Technology and Computer Application (ITCA)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1