首页 > 最新文献

2019 IEEE 4th Advanced Information Technology, Electronic and Automation Control Conference (IAEAC)最新文献

英文 中文
Intelligent Diagnosis Model Based on Optimized Probabilistic Neural Networks 基于优化概率神经网络的智能诊断模型
Xiaohan Wei, Bin Xu, Yunqing Gong, Qing Zhang
Existing intelligent fault diagnosis models for equipment are insufficient in time-consuming and complication, making it hard to apply to practice. A novel intelligent diagnosis model has been carried out in this paper to improve this issue. Firstly, the process that experts realize the reasoning diagnosis by experience is analyzed to design an intelligent analysis flow. Based on the probabilistic neural network, the fault knowledge learning and reasoning from a large number of samples are carried out. Then the fault knowledge is mapped into a high-dimensional spatial distribution to realize the optimization of the probabilistic neural network. Finally, the fault bearing data is used to verify model performance.
现有的设备智能故障诊断模型耗时短、复杂,难以应用于实际。为了解决这一问题,本文提出了一种新的智能诊断模型。首先,分析了专家通过经验实现推理诊断的过程,设计了智能分析流程;基于概率神经网络,对大量样本进行故障知识学习和推理。然后将故障知识映射成高维空间分布,实现概率神经网络的优化。最后,利用故障轴承数据验证模型的性能。
{"title":"Intelligent Diagnosis Model Based on Optimized Probabilistic Neural Networks","authors":"Xiaohan Wei, Bin Xu, Yunqing Gong, Qing Zhang","doi":"10.1109/IAEAC47372.2019.8997801","DOIUrl":"https://doi.org/10.1109/IAEAC47372.2019.8997801","url":null,"abstract":"Existing intelligent fault diagnosis models for equipment are insufficient in time-consuming and complication, making it hard to apply to practice. A novel intelligent diagnosis model has been carried out in this paper to improve this issue. Firstly, the process that experts realize the reasoning diagnosis by experience is analyzed to design an intelligent analysis flow. Based on the probabilistic neural network, the fault knowledge learning and reasoning from a large number of samples are carried out. Then the fault knowledge is mapped into a high-dimensional spatial distribution to realize the optimization of the probabilistic neural network. Finally, the fault bearing data is used to verify model performance.","PeriodicalId":164163,"journal":{"name":"2019 IEEE 4th Advanced Information Technology, Electronic and Automation Control Conference (IAEAC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134191314","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Job Information Crawling, Visualization and Clustering of Job Search Websites 求职网站的职位信息抓取、可视化和聚类
Zhen Yang, Sanxing Cao
With so much information available on job-hunting websites, the partial information provided by job-hunting websites is of little reference value to fresh graduates or cross-industry job seekers. This paper is a machine learning algorithm based on Python language. It makes a comprehensive analysis of job information and realizes the visualization and text clustering of job information. It has good applicability and is convenient to be extended to other fields.
求职网站上的信息如此之多,求职网站提供的部分信息对应届毕业生或跨行业求职者的参考价值不大。本文是一种基于Python语言的机器学习算法。对招聘信息进行综合分析,实现招聘信息的可视化和文本聚类。它具有良好的适用性,便于推广到其他领域。
{"title":"Job Information Crawling, Visualization and Clustering of Job Search Websites","authors":"Zhen Yang, Sanxing Cao","doi":"10.1109/IAEAC47372.2019.8997713","DOIUrl":"https://doi.org/10.1109/IAEAC47372.2019.8997713","url":null,"abstract":"With so much information available on job-hunting websites, the partial information provided by job-hunting websites is of little reference value to fresh graduates or cross-industry job seekers. This paper is a machine learning algorithm based on Python language. It makes a comprehensive analysis of job information and realizes the visualization and text clustering of job information. It has good applicability and is convenient to be extended to other fields.","PeriodicalId":164163,"journal":{"name":"2019 IEEE 4th Advanced Information Technology, Electronic and Automation Control Conference (IAEAC)","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133886699","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Malicious nodes detection algorithm based on triangle module fusion operator in wireless sensor networks 基于三角形模块融合算子的无线传感器网络恶意节点检测算法
Li Min, Gao Ranxin
The characteristics of wireless sensor networks and its deployment environment determine that wireless sensor networks is vulnerable to intrusion. In this paper, a malicious nodes detection algorithm based on triangle module fusion operator (MDTMO) is proposed for selective forwarding attack. The algorithm establishes the membership functions according to data packets that received and forwarded by the node, it uses the fusion method of triangle module operator to determine the suspected malicious node. Subsequently, the base station node detects the buffer occupancy and channel occupancy of the suspected malicious node to judge whether the network is in congestion. If the network quality is good, it is considered that the packets loss is due to the selective forwarding attack instead of congestion, so the node is judged to be a malicious node. The experimental results show that compared with the algorithm in [6], MDTMO has improved performance in both the malicious nodes detection rate and false positive rate.
无线传感器网络的特点及其部署环境决定了无线传感器网络容易受到入侵。针对选择性转发攻击,提出了一种基于三角模块融合算子(MDTMO)的恶意节点检测算法。该算法根据节点接收和转发的数据包建立隶属函数,采用三角模块算子的融合方法确定可疑恶意节点。随后,基站节点检测疑似恶意节点的缓冲区占用率和信道占用率,判断网络是否处于拥塞状态。如果网络质量良好,则认为丢包是选择性转发攻击造成的,而不是拥塞造成的,因此判断该节点为恶意节点。实验结果表明,与[6]中的算法相比,MDTMO在恶意节点检测率和误报率方面都有提高。
{"title":"Malicious nodes detection algorithm based on triangle module fusion operator in wireless sensor networks","authors":"Li Min, Gao Ranxin","doi":"10.1109/IAEAC47372.2019.8997710","DOIUrl":"https://doi.org/10.1109/IAEAC47372.2019.8997710","url":null,"abstract":"The characteristics of wireless sensor networks and its deployment environment determine that wireless sensor networks is vulnerable to intrusion. In this paper, a malicious nodes detection algorithm based on triangle module fusion operator (MDTMO) is proposed for selective forwarding attack. The algorithm establishes the membership functions according to data packets that received and forwarded by the node, it uses the fusion method of triangle module operator to determine the suspected malicious node. Subsequently, the base station node detects the buffer occupancy and channel occupancy of the suspected malicious node to judge whether the network is in congestion. If the network quality is good, it is considered that the packets loss is due to the selective forwarding attack instead of congestion, so the node is judged to be a malicious node. The experimental results show that compared with the algorithm in [6], MDTMO has improved performance in both the malicious nodes detection rate and false positive rate.","PeriodicalId":164163,"journal":{"name":"2019 IEEE 4th Advanced Information Technology, Electronic and Automation Control Conference (IAEAC)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133989262","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Luminescent Polymer Thims in Microelectronic Sensors 微电子传感器中的发光聚合物薄膜
Zhaoye Li, Zhaojun Xue, X. Ni
many electronic sensors need different colors when used in detections, indications and other different applications. These colors can come from europium ions taken polymer matrixes as basis materials. Colored sensors can be used in different integrated circuits. Though many integrated circuits are composed of semiconductors, they are easily cracked. Weak film-formation property hinders their markets and profits. In order to improve film formation, polymer matrixes are mixed in semiconductors and integrated circuits. Good film-formation property enhances furious competition and development of colored widescreen. In this paper, colored thin films were prepared, which could be used in ions sensors and widescreen.
许多电子传感器在检测、指示和其他不同的应用中需要不同的颜色。这些颜色可以来自以聚合物基质为基础材料的铕离子。彩色传感器可用于不同的集成电路。虽然许多集成电路是由半导体组成的,但它们很容易被破坏。薄弱的电影制作属性阻碍了他们的市场和利润。为了改善薄膜的形成,在半导体和集成电路中混合聚合物基质。良好的成膜性促进了彩色宽屏的激烈竞争和发展。本文制备了可用于离子传感器和宽屏的彩色薄膜。
{"title":"Luminescent Polymer Thims in Microelectronic Sensors","authors":"Zhaoye Li, Zhaojun Xue, X. Ni","doi":"10.1109/IAEAC47372.2019.8997582","DOIUrl":"https://doi.org/10.1109/IAEAC47372.2019.8997582","url":null,"abstract":"many electronic sensors need different colors when used in detections, indications and other different applications. These colors can come from europium ions taken polymer matrixes as basis materials. Colored sensors can be used in different integrated circuits. Though many integrated circuits are composed of semiconductors, they are easily cracked. Weak film-formation property hinders their markets and profits. In order to improve film formation, polymer matrixes are mixed in semiconductors and integrated circuits. Good film-formation property enhances furious competition and development of colored widescreen. In this paper, colored thin films were prepared, which could be used in ions sensors and widescreen.","PeriodicalId":164163,"journal":{"name":"2019 IEEE 4th Advanced Information Technology, Electronic and Automation Control Conference (IAEAC)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134165667","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Influence of Different Gas Parameters on Sensitivity of Thermal Expansion Gyroscope 不同气体参数对热膨胀陀螺仪灵敏度的影响
Anrun Ren, L. Piao, Yuxing Wang
In this paper, the effects of gas heat capacity, thermal conductivity, viscosity coefficient and pressure on the sensitivity of thermal expansion fluid gyro were studied. The temperature field and flow field of sensing component were calculated by using COMSOL software. The flow velocity decreases with the increase of specific heat capacity, thermal conductivity of the working gas. But the flow velocity increases with the increase of pressure in the cavity. there is no significant change in flow velocity under different viscosity coefficients. The sensitivity of thermal expansion flow gyro increases with the increase of specific heat capacity of working gas and pressure in the cavity. But the sensitivity decreases with the increase of thermal conductivity and viscosity coefficient of the working gas.
本文研究了气体热容量、导热系数、粘度系数和压力对热膨胀流体陀螺灵敏度的影响。利用COMSOL软件计算了传感元件的温度场和流场。流速随工作气体比热容、导热系数的增大而减小。但随着腔内压力的增大,流速增大。不同粘度系数下的流速变化不显著。热膨胀流陀螺的灵敏度随工作气体比热容和腔内压力的增大而增大。但灵敏度随工作气体导热系数和粘度系数的增大而减小。
{"title":"Influence of Different Gas Parameters on Sensitivity of Thermal Expansion Gyroscope","authors":"Anrun Ren, L. Piao, Yuxing Wang","doi":"10.1109/IAEAC47372.2019.8997679","DOIUrl":"https://doi.org/10.1109/IAEAC47372.2019.8997679","url":null,"abstract":"In this paper, the effects of gas heat capacity, thermal conductivity, viscosity coefficient and pressure on the sensitivity of thermal expansion fluid gyro were studied. The temperature field and flow field of sensing component were calculated by using COMSOL software. The flow velocity decreases with the increase of specific heat capacity, thermal conductivity of the working gas. But the flow velocity increases with the increase of pressure in the cavity. there is no significant change in flow velocity under different viscosity coefficients. The sensitivity of thermal expansion flow gyro increases with the increase of specific heat capacity of working gas and pressure in the cavity. But the sensitivity decreases with the increase of thermal conductivity and viscosity coefficient of the working gas.","PeriodicalId":164163,"journal":{"name":"2019 IEEE 4th Advanced Information Technology, Electronic and Automation Control Conference (IAEAC)","volume":"95 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131632676","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on Time Concealed Channel Technology of Cloud Computing Platform Based on Shared Memory 基于共享内存的云计算平台时间隐藏信道技术研究
Shenmin Zhang, Chencheng Wang, Qi-Shan Wang
Security issues severely restrict the development and popularization of cloud computing. As a way of data leakage, covert channel greatly threatens the security of cloud platform. This paper introduces the types and research status of covert channels, and discusses the classical detection and interference methods of time-covert channels on cloud platforms for shared memory time covert channels.
安全问题严重制约着云计算的发展和普及。隐蔽通道作为数据泄露的一种方式,对云平台的安全构成了极大的威胁。介绍了隐蔽信道的类型和研究现状,讨论了云平台上用于共享内存隐蔽信道的经典时间隐蔽信道检测和干扰方法。
{"title":"Research on Time Concealed Channel Technology of Cloud Computing Platform Based on Shared Memory","authors":"Shenmin Zhang, Chencheng Wang, Qi-Shan Wang","doi":"10.1109/IAEAC47372.2019.8997733","DOIUrl":"https://doi.org/10.1109/IAEAC47372.2019.8997733","url":null,"abstract":"Security issues severely restrict the development and popularization of cloud computing. As a way of data leakage, covert channel greatly threatens the security of cloud platform. This paper introduces the types and research status of covert channels, and discusses the classical detection and interference methods of time-covert channels on cloud platforms for shared memory time covert channels.","PeriodicalId":164163,"journal":{"name":"2019 IEEE 4th Advanced Information Technology, Electronic and Automation Control Conference (IAEAC)","volume":"14 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131840378","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Bi-Directional LSTM Model with Attention for Malicious URL Detection 基于关注的双向LSTM模型恶意URL检测
Fangli Ren, Zhengwei Jiang, Jian Liu
Malicious URLs have become an important attack vector used by attackers to perpetrate cybercrimes, how to effectively detect malicious URLs is an important and urgent problem to be solved. Due to current feature based malicious URLs detection models need manual feature engineering, and deep learning based models have their limit on processing long sequences, which reduces the detection performance. We proposed an attentional based BiLSTM model AB-BiLSTM for the Malicious URLs detection in this paper. Firstly, the URLs were preprocessed and converted into word vectors by using pre-trained Word2Vec, then BiLSTM combined with an attention mechanism was trained to extract URL sequences features and classify them. The model was tested on collected dataset, the experimental results show that our proposed model can achieve the accuracy of 98.06%, the precision rate of 96.05, the recall rate of 95.79% and the F1 Score of 95.92%, which achieved better performance than other comparison traditional machine learning based and deep learning based models.
恶意url已经成为攻击者实施网络犯罪的重要攻击载体,如何有效检测恶意url是一个重要而迫切需要解决的问题。由于目前基于特征的恶意url检测模型需要手工进行特征工程,而基于深度学习的模型在处理长序列时有其局限性,从而降低了检测性能。本文提出了一种基于注意力的BiLSTM模型AB-BiLSTM,用于恶意url的检测。首先,利用预先训练好的Word2Vec对URL进行预处理并转化为词向量,然后结合注意机制训练BiLSTM提取URL序列特征并进行分类。在收集的数据集上对该模型进行了测试,实验结果表明,该模型的准确率为98.06%,准确率为96.05,召回率为95.79%,F1分数为95.92%,优于其他基于传统机器学习和深度学习的模型对比。
{"title":"A Bi-Directional LSTM Model with Attention for Malicious URL Detection","authors":"Fangli Ren, Zhengwei Jiang, Jian Liu","doi":"10.1109/IAEAC47372.2019.8997947","DOIUrl":"https://doi.org/10.1109/IAEAC47372.2019.8997947","url":null,"abstract":"Malicious URLs have become an important attack vector used by attackers to perpetrate cybercrimes, how to effectively detect malicious URLs is an important and urgent problem to be solved. Due to current feature based malicious URLs detection models need manual feature engineering, and deep learning based models have their limit on processing long sequences, which reduces the detection performance. We proposed an attentional based BiLSTM model AB-BiLSTM for the Malicious URLs detection in this paper. Firstly, the URLs were preprocessed and converted into word vectors by using pre-trained Word2Vec, then BiLSTM combined with an attention mechanism was trained to extract URL sequences features and classify them. The model was tested on collected dataset, the experimental results show that our proposed model can achieve the accuracy of 98.06%, the precision rate of 96.05, the recall rate of 95.79% and the F1 Score of 95.92%, which achieved better performance than other comparison traditional machine learning based and deep learning based models.","PeriodicalId":164163,"journal":{"name":"2019 IEEE 4th Advanced Information Technology, Electronic and Automation Control Conference (IAEAC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128940762","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Revisiting the Reed-Muller Locally Correctable Codes 重新审视Reed-Muller局部可校正码
Feng Cheng
Local codes are a special kind of error-correcting codes. Locally correctable codes (LCCs) are one type of local codes. LCCs can efficiently recover any coordinate of its corrupted encoding by probing only a few but not all fraction of the corrupted word. A q-ary LCC which encodes length k messages to length N codewords with relative distance Δ has three parameters: r, δ and ϵ. r is called query complexity recording the number of queries. δ is called tolerance fraction measuring the relative distance between encoding codewords and its corrupted codes which can be locally decoded. ϵ is called error probability showing the coordinate of its corrupted encoding fail to be recovered with probability at most ϵ. One fundamental problem in LCCs is to determine the trade-off among rate, distance and query complexity. But for a specific LCC, focus is on query complexity, tolerance fraction and error probability. Reed-Muller codes (RM codes) are the most presentative LCCs. In order to understand the "local" more clearly, we revisit local correctors for RM codes and analyze them in detail: 1)The decoding procedures; 2)The role of Reed-Solomon codes (RS codes) in decoding RM LCCs; 3)Other local correctors for RM codes. How parameters including r, δ and ϵ change in RM LCCs have been analyzed in different correctors. We believe this paper can help us understand local codes better and grasp the main soul of this research direction.
局域码是一种特殊的纠错码。局部可校正码(lcc)是一种局部码。lcc可以通过探测损坏字的一小部分而不是全部来有效地恢复其损坏编码的任何坐标。一个q元LCC将长度为k的消息编码为长度为N的码字,相对距离为Δ,它有三个参数:r, Δ和λ。R称为查询复杂度,记录查询的数量。δ称为容差分数,表示编码码字与其可局部译码的损坏码之间的相对距离。λ被称为错误概率,表示其被破坏的编码坐标无法以最多λ的概率恢复。lcc的一个基本问题是确定速率、距离和查询复杂性之间的权衡。但对于特定的LCC,重点是查询复杂度、容差分数和错误概率。Reed-Muller码(RM码)是最具代表性的lcc。为了更清晰地理解“局部”,我们重新审视RM码的局部校正器,并对其进行详细分析:1)译码过程;2) Reed-Solomon码(RS码)在RM lcc解码中的作用;3)其他本地RM代码校正器。在不同的校正器中分析了RM lcc中r、δ和λ等参数的变化。我们相信本文可以帮助我们更好地理解地方代码,把握这一研究方向的主要灵魂。
{"title":"Revisiting the Reed-Muller Locally Correctable Codes","authors":"Feng Cheng","doi":"10.1109/IAEAC47372.2019.8997905","DOIUrl":"https://doi.org/10.1109/IAEAC47372.2019.8997905","url":null,"abstract":"Local codes are a special kind of error-correcting codes. Locally correctable codes (LCCs) are one type of local codes. LCCs can efficiently recover any coordinate of its corrupted encoding by probing only a few but not all fraction of the corrupted word. A q-ary LCC which encodes length k messages to length N codewords with relative distance Δ has three parameters: r, δ and ϵ. r is called query complexity recording the number of queries. δ is called tolerance fraction measuring the relative distance between encoding codewords and its corrupted codes which can be locally decoded. ϵ is called error probability showing the coordinate of its corrupted encoding fail to be recovered with probability at most ϵ. One fundamental problem in LCCs is to determine the trade-off among rate, distance and query complexity. But for a specific LCC, focus is on query complexity, tolerance fraction and error probability. Reed-Muller codes (RM codes) are the most presentative LCCs. In order to understand the \"local\" more clearly, we revisit local correctors for RM codes and analyze them in detail: 1)The decoding procedures; 2)The role of Reed-Solomon codes (RS codes) in decoding RM LCCs; 3)Other local correctors for RM codes. How parameters including r, δ and ϵ change in RM LCCs have been analyzed in different correctors. We believe this paper can help us understand local codes better and grasp the main soul of this research direction.","PeriodicalId":164163,"journal":{"name":"2019 IEEE 4th Advanced Information Technology, Electronic and Automation Control Conference (IAEAC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131198803","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A batch data based PSO identification method for Hammerstein systems 基于批量数据的Hammerstein系统粒子群辨识方法
Zhixin Wang, Dongqing Wang
For a single input-output Hammerstein model with a polynomial nonlinear part, the standard particle swarm optimization (PSO) method loses some accuracy, due to computing fitness only based on a set of input-output data in each iteration. Therefore, to promote the identification accuracy, this paper investigates a batch data based particle swarm optimization (BD-PSO) method to identify parameters of the system. The simulation results prove that the BDPSO method has a fast convergence speed and has a good estimation accuracy.
对于具有多项式非线性部分的单输入-输出Hammerstein模型,标准粒子群优化(PSO)方法由于每次迭代只基于一组输入-输出数据计算适应度而失去了一定的精度。因此,为了提高系统的辨识精度,本文研究了一种基于批量数据的粒子群优化(BD-PSO)方法来辨识系统参数。仿真结果表明,该方法收敛速度快,估计精度高。
{"title":"A batch data based PSO identification method for Hammerstein systems","authors":"Zhixin Wang, Dongqing Wang","doi":"10.1109/IAEAC47372.2019.8997869","DOIUrl":"https://doi.org/10.1109/IAEAC47372.2019.8997869","url":null,"abstract":"For a single input-output Hammerstein model with a polynomial nonlinear part, the standard particle swarm optimization (PSO) method loses some accuracy, due to computing fitness only based on a set of input-output data in each iteration. Therefore, to promote the identification accuracy, this paper investigates a batch data based particle swarm optimization (BD-PSO) method to identify parameters of the system. The simulation results prove that the BDPSO method has a fast convergence speed and has a good estimation accuracy.","PeriodicalId":164163,"journal":{"name":"2019 IEEE 4th Advanced Information Technology, Electronic and Automation Control Conference (IAEAC)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133068843","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Maximum Generation Capacity Replaced by Wind Power Considering Voltage and Transient Stability 考虑电压和暂态稳定的风电替代最大发电容量
Anjia Mao, Jing Ma, Shengyu Kuai, Cong Chen, Qinyong Zhou, Shanshan Zhao
Under the circumstance that the global energy security and environmental issues becoming increasingly critical, developing new energy sources has become an important demand for sustainable development of energy and economies in China and even the world. As an important renewable energy source, wind power has been developed and applied in many places around the world. Since the output characteristics of wind power are greatly different from the conventional generation unit, when a large number of conventional generators in the system are replaced by wind power, the system voltage and power angle stability characteristics will change, which may even destroy the stability of the whole system. Therefore, Determine the maximum generating capacity that replaced by wind power is significant for the security of the power system. Based on the mathematical model of power system stability, by utilizing network equations and the simplified wind power model, this paper obtained the maximum generating capacity that can be replaced by wind power under the precondition of satisfying the power angle and voltage stability. Finally, the WSCC 3-machine 9-bus system is used to simulate and testify the method with the DigSILENT PowerFactory software. The outcome shows that the model and conclusions in the report are verified.
在全球能源安全和环境问题日益严峻的背景下,开发新能源已成为中国乃至世界能源和经济可持续发展的重要需求。风力发电作为一种重要的可再生能源,在世界许多地方得到了开发和应用。由于风电的输出特性与常规发电机组有很大的不同,当系统中大量的常规发电机组被风电取代时,系统电压和功率角稳定特性会发生变化,甚至可能破坏整个系统的稳定性。因此,确定风电替代的最大发电容量对电力系统的安全具有重要意义。在电力系统稳定性数学模型的基础上,利用网络方程和简化的风电模型,得到了在满足功率角和电压稳定的前提下,风电可替代的最大发电量。最后,以WSCC 3机9总线系统为例,利用DigSILENT PowerFactory软件对该方法进行了仿真验证。结果表明,报告中的模型和结论得到了验证。
{"title":"The Maximum Generation Capacity Replaced by Wind Power Considering Voltage and Transient Stability","authors":"Anjia Mao, Jing Ma, Shengyu Kuai, Cong Chen, Qinyong Zhou, Shanshan Zhao","doi":"10.1109/IAEAC47372.2019.8997817","DOIUrl":"https://doi.org/10.1109/IAEAC47372.2019.8997817","url":null,"abstract":"Under the circumstance that the global energy security and environmental issues becoming increasingly critical, developing new energy sources has become an important demand for sustainable development of energy and economies in China and even the world. As an important renewable energy source, wind power has been developed and applied in many places around the world. Since the output characteristics of wind power are greatly different from the conventional generation unit, when a large number of conventional generators in the system are replaced by wind power, the system voltage and power angle stability characteristics will change, which may even destroy the stability of the whole system. Therefore, Determine the maximum generating capacity that replaced by wind power is significant for the security of the power system. Based on the mathematical model of power system stability, by utilizing network equations and the simplified wind power model, this paper obtained the maximum generating capacity that can be replaced by wind power under the precondition of satisfying the power angle and voltage stability. Finally, the WSCC 3-machine 9-bus system is used to simulate and testify the method with the DigSILENT PowerFactory software. The outcome shows that the model and conclusions in the report are verified.","PeriodicalId":164163,"journal":{"name":"2019 IEEE 4th Advanced Information Technology, Electronic and Automation Control Conference (IAEAC)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133389878","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2019 IEEE 4th Advanced Information Technology, Electronic and Automation Control Conference (IAEAC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1