首页 > 最新文献

2019 IEEE 4th Advanced Information Technology, Electronic and Automation Control Conference (IAEAC)最新文献

英文 中文
Research on intelligent decision support system of ship’s hull plates curved forming by line heating 船舶船体板线加热弯曲成形智能决策支持系统研究
Liang Qi, Wei Wang, Liang Dong, Liankai Chen, Chenwei Ge, Jing Huang, Ganmin Xue, Xuan Jia
In the process of curved forming for ship’s hull plates, one of the main parameters is to determine the position of the flame path . By research on the theory for curved forming of ship’s surface, the comprehensive database of hull plate surface deformation is established, and the prediction algorithm of hull plate process parameters is put forward by combining the optimization of plate unfolding method and ACA, and the corresponding prediction system of process parameters is developed.
在船体板曲面成形过程中,确定火焰路径的位置是主要参数之一。通过对船舶表面曲面成形理论的研究,建立了船体板表面变形综合数据库,并将板展开优化方法与ACA相结合,提出了船体板工艺参数预测算法,开发了相应的工艺参数预测系统。
{"title":"Research on intelligent decision support system of ship’s hull plates curved forming by line heating","authors":"Liang Qi, Wei Wang, Liang Dong, Liankai Chen, Chenwei Ge, Jing Huang, Ganmin Xue, Xuan Jia","doi":"10.1109/IAEAC47372.2019.8997638","DOIUrl":"https://doi.org/10.1109/IAEAC47372.2019.8997638","url":null,"abstract":"In the process of curved forming for ship’s hull plates, one of the main parameters is to determine the position of the flame path . By research on the theory for curved forming of ship’s surface, the comprehensive database of hull plate surface deformation is established, and the prediction algorithm of hull plate process parameters is put forward by combining the optimization of plate unfolding method and ACA, and the corresponding prediction system of process parameters is developed.","PeriodicalId":164163,"journal":{"name":"2019 IEEE 4th Advanced Information Technology, Electronic and Automation Control Conference (IAEAC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123515930","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Advanced Density Peak and K-means Clustering on Image Segmentation 基于密度峰值和k均值聚类的图像分割
Yu Hui, Yanju Han
K-means is a classical and widely-used data clustering algorithm. Despite its effectiveness, the drawbacks are obvious that it needs to know k value previously and not suitable for complex situations. Density Peak clustering can practice on irregular data sets with a higher accuracy and better performance than K-means and doesn’t need to get prior knowledge. However, few concentrated on their performances on image segmentation. In this paper, we propose novel image segmentation approaches based on K-means and Density Peak clustering which greatly reduce running time. Compared with current methods, our methods have improved aspects as following: 1) The methods could have much shorter run time performance than other current normal methods. 2) Unlike other current image segmentation methods, our method could save the original colors of the pictures and provide a rather real image segments. Experiments on test data will testify the validity of the methods and a detailed description based on empirical results will be provided as conclusions.
K-means是一种经典且应用广泛的数据聚类算法。尽管它很有效,但缺点很明显,它需要事先知道k值,不适合复杂的情况。密度峰聚类可以在不规则数据集上进行练习,比K-means具有更高的精度和更好的性能,并且不需要获得先验知识。然而,很少有人关注它们在图像分割方面的性能。本文提出了基于k均值和密度峰聚类的图像分割方法,大大减少了运行时间。与现有方法相比,我们的方法有以下几个方面的改进:1)与现有的常规方法相比,该方法的运行时性能大大缩短。2)与现有的其他图像分割方法不同,我们的方法可以保存图像的原始颜色,并提供比较真实的图像片段。测试数据的实验将证明方法的有效性,并根据经验结果提供详细的描述作为结论。
{"title":"Advanced Density Peak and K-means Clustering on Image Segmentation","authors":"Yu Hui, Yanju Han","doi":"10.1109/IAEAC47372.2019.8997758","DOIUrl":"https://doi.org/10.1109/IAEAC47372.2019.8997758","url":null,"abstract":"K-means is a classical and widely-used data clustering algorithm. Despite its effectiveness, the drawbacks are obvious that it needs to know k value previously and not suitable for complex situations. Density Peak clustering can practice on irregular data sets with a higher accuracy and better performance than K-means and doesn’t need to get prior knowledge. However, few concentrated on their performances on image segmentation. In this paper, we propose novel image segmentation approaches based on K-means and Density Peak clustering which greatly reduce running time. Compared with current methods, our methods have improved aspects as following: 1) The methods could have much shorter run time performance than other current normal methods. 2) Unlike other current image segmentation methods, our method could save the original colors of the pictures and provide a rather real image segments. Experiments on test data will testify the validity of the methods and a detailed description based on empirical results will be provided as conclusions.","PeriodicalId":164163,"journal":{"name":"2019 IEEE 4th Advanced Information Technology, Electronic and Automation Control Conference (IAEAC)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121921612","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Design of Remote Meter Monitoring System Based on MCU Control 基于单片机控制的远程仪表监控系统设计
Zhaoxing Meng, Ying Zhu, Haiqiang Lv, Xinjian Xu
According to the requirements of meter reading in the station area, the design principle and remote communication scheme of the system are established, and the overall design scheme of the system is established. In view of the shortcomings of GSM communication, GPRS data communication scheme is adopted. According to the working principle of the system, the data acquisition, digital-analog conversion and data transmission processes are analyzed and studied, which improves the data transmission capability of the system. In the hardware design of the system, the main controller adopts AT89C51 8-bit MCU, serial communication includes RS-232, RS-485 and various communication interfaces. The design of sampling circuit combines filter circuit and phase-locked loop circuit, which effectively improves the accuracy of data acquisition and anti-interference ability.
根据站区抄表的要求,确立了系统的设计原则和远程通信方案,建立了系统的总体设计方案。针对GSM通信的不足,采用了GPRS数据通信方案。根据系统的工作原理,对数据采集、数模转换和数据传输过程进行了分析和研究,提高了系统的数据传输能力。在系统的硬件设计中,主控制器采用AT89C51 8位单片机,串行通信包括RS-232、RS-485等多种通信接口。采样电路的设计结合了滤波电路和锁相环电路,有效地提高了数据采集的精度和抗干扰能力。
{"title":"Design of Remote Meter Monitoring System Based on MCU Control","authors":"Zhaoxing Meng, Ying Zhu, Haiqiang Lv, Xinjian Xu","doi":"10.1109/IAEAC47372.2019.8997889","DOIUrl":"https://doi.org/10.1109/IAEAC47372.2019.8997889","url":null,"abstract":"According to the requirements of meter reading in the station area, the design principle and remote communication scheme of the system are established, and the overall design scheme of the system is established. In view of the shortcomings of GSM communication, GPRS data communication scheme is adopted. According to the working principle of the system, the data acquisition, digital-analog conversion and data transmission processes are analyzed and studied, which improves the data transmission capability of the system. In the hardware design of the system, the main controller adopts AT89C51 8-bit MCU, serial communication includes RS-232, RS-485 and various communication interfaces. The design of sampling circuit combines filter circuit and phase-locked loop circuit, which effectively improves the accuracy of data acquisition and anti-interference ability.","PeriodicalId":164163,"journal":{"name":"2019 IEEE 4th Advanced Information Technology, Electronic and Automation Control Conference (IAEAC)","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122172382","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Restore the Original data by Embedded data 通过嵌入数据恢复原始数据
Jianyuan Cui, Gang Li, P. Zhou, Jia Qi Zhang
Network is an important representation method to describe related objects. For network, the most core research is to reasonably represent the characteristic information of nodes in the network, which is called network representation learning. In recent years, many scholars have proposed many excellent representation learning algorithms, through which the original network data can be embedded in low-dimensional representation, which can help us classify the nodes in the network, and the nodes can also be used as point coordinates in Euclidean space for visualization. Existing algorithms are all aimed at embedding the original data, but how to use the embedded data to restore the original data when the original data is incomplete has not been studied by scholars. In order to solve this problem, this paper proposes two solutions of deep learning, one is the artificial neural network method based on deep learning, and the other is the attention mechanism method based on deep learning. The experimental results of this paper show that these two methods are very effective.
网络是描述相关对象的一种重要的表示方法。对于网络来说,最核心的研究是合理地表示网络中节点的特征信息,这被称为网络表示学习。近年来,许多学者提出了许多优秀的表示学习算法,通过这些算法可以将原始网络数据嵌入到低维表示中,这样可以帮助我们对网络中的节点进行分类,并且这些节点也可以作为欧几里德空间中的点坐标进行可视化。现有的算法都是为了嵌入原始数据,但如何在原始数据不完整的情况下利用嵌入的数据还原原始数据,还没有学者进行研究。为了解决这一问题,本文提出了深度学习的两种解决方案,一种是基于深度学习的人工神经网络方法,另一种是基于深度学习的注意机制方法。实验结果表明,这两种方法都是非常有效的。
{"title":"Restore the Original data by Embedded data","authors":"Jianyuan Cui, Gang Li, P. Zhou, Jia Qi Zhang","doi":"10.1109/IAEAC47372.2019.8997598","DOIUrl":"https://doi.org/10.1109/IAEAC47372.2019.8997598","url":null,"abstract":"Network is an important representation method to describe related objects. For network, the most core research is to reasonably represent the characteristic information of nodes in the network, which is called network representation learning. In recent years, many scholars have proposed many excellent representation learning algorithms, through which the original network data can be embedded in low-dimensional representation, which can help us classify the nodes in the network, and the nodes can also be used as point coordinates in Euclidean space for visualization. Existing algorithms are all aimed at embedding the original data, but how to use the embedded data to restore the original data when the original data is incomplete has not been studied by scholars. In order to solve this problem, this paper proposes two solutions of deep learning, one is the artificial neural network method based on deep learning, and the other is the attention mechanism method based on deep learning. The experimental results of this paper show that these two methods are very effective.","PeriodicalId":164163,"journal":{"name":"2019 IEEE 4th Advanced Information Technology, Electronic and Automation Control Conference (IAEAC)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124608649","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on Digital Forensics Framework for Malicious Behavior in Cloud 云环境下恶意行为的数字取证框架研究
Guangxuan Chen, Di Wu, Guangxiao Chen, Panke Qin, Lei Zhang, Qiang Liu
The difficult of detecting, response, tracing the malicious behavior in cloud has brought great challenges to the law enforcement in combating cybercrimes. This paper presents a malicious behavior oriented framework of detection, emergency response, traceability, and digital forensics in cloud environment. A cloud-based malicious behavior detection mechanism based on SDN is constructed, which implements full-traffic flow detection technology and malicious virtual machine detection based on memory analysis. The emergency response and traceability module can clarify the types of the malicious behavior and the impacts of the events, and locate the source of the event. The key nodes and paths of the infection topology or propagation path of the malicious behavior will be located security measure will be dispatched timely. The proposed IaaS service based forensics module realized the virtualization facility memory evidence extraction and analysis techniques, which can solve volatile data loss problems that often happened in traditional forensic methods.
云环境中恶意行为的检测、响应和追踪的难度给打击网络犯罪的执法带来了巨大的挑战。本文提出了一种基于云环境的恶意行为检测、应急响应、可追溯性和数字取证的框架。构建了基于SDN的云恶意行为检测机制,实现了全流量检测技术和基于内存分析的恶意虚拟机检测。应急响应和溯源模块可以明确恶意行为的类型和事件的影响,定位事件的源头。确定感染拓扑的关键节点和路径或恶意行为的传播路径,及时调度安全措施。提出的基于IaaS服务的取证模块实现了虚拟化设施内存证据提取和分析技术,解决了传统取证方法中易失性数据丢失的问题。
{"title":"Research on Digital Forensics Framework for Malicious Behavior in Cloud","authors":"Guangxuan Chen, Di Wu, Guangxiao Chen, Panke Qin, Lei Zhang, Qiang Liu","doi":"10.1109/IAEAC47372.2019.8997702","DOIUrl":"https://doi.org/10.1109/IAEAC47372.2019.8997702","url":null,"abstract":"The difficult of detecting, response, tracing the malicious behavior in cloud has brought great challenges to the law enforcement in combating cybercrimes. This paper presents a malicious behavior oriented framework of detection, emergency response, traceability, and digital forensics in cloud environment. A cloud-based malicious behavior detection mechanism based on SDN is constructed, which implements full-traffic flow detection technology and malicious virtual machine detection based on memory analysis. The emergency response and traceability module can clarify the types of the malicious behavior and the impacts of the events, and locate the source of the event. The key nodes and paths of the infection topology or propagation path of the malicious behavior will be located security measure will be dispatched timely. The proposed IaaS service based forensics module realized the virtualization facility memory evidence extraction and analysis techniques, which can solve volatile data loss problems that often happened in traditional forensic methods.","PeriodicalId":164163,"journal":{"name":"2019 IEEE 4th Advanced Information Technology, Electronic and Automation Control Conference (IAEAC)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124779361","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Design Puncturing Polar Codes : The Odd-numbered Criterion 设计穿刺极性码:奇数准则
Rujing Xiong, Honggui Deng, Hao-hao Zhao, Yuxin Feng
We propose the odd-numbered criterion to design puncturing polar codes and a new puncturing algorithm was put out in this paper. In view of the unreasonable puncturing selection standards, unsatisfactory decoding performance and high computational complexity of the current algorithms, we do many analysis and comparison and find some rules, then we present the odd-numbered criterion, analyzing its’ reliability and effectiveness. According to it we design a new algorithm based on correlation coefficient we defined, and the results manifest that the algorithm can greatly improve the decoding error rate performance of the polar code while reducing the computational complexity, it can bring great benefits to the application of the polar code in the digital communication system significantly.
本文提出了奇数准则来设计穿刺极码,并提出了一种新的穿刺算法。针对现有算法穿刺选择标准不合理、译码性能不理想、计算量大等问题,进行了大量的分析比较,发现了一些规律,提出了奇数准则,分析了其可靠性和有效性。在此基础上,基于定义的相关系数设计了一种新的算法,实验结果表明,该算法在降低计算复杂度的同时,大大提高了极化码的译码误码率性能,为极化码在数字通信系统中的应用带来了极大的好处。
{"title":"Design Puncturing Polar Codes : The Odd-numbered Criterion","authors":"Rujing Xiong, Honggui Deng, Hao-hao Zhao, Yuxin Feng","doi":"10.1109/IAEAC47372.2019.8997843","DOIUrl":"https://doi.org/10.1109/IAEAC47372.2019.8997843","url":null,"abstract":"We propose the odd-numbered criterion to design puncturing polar codes and a new puncturing algorithm was put out in this paper. In view of the unreasonable puncturing selection standards, unsatisfactory decoding performance and high computational complexity of the current algorithms, we do many analysis and comparison and find some rules, then we present the odd-numbered criterion, analyzing its’ reliability and effectiveness. According to it we design a new algorithm based on correlation coefficient we defined, and the results manifest that the algorithm can greatly improve the decoding error rate performance of the polar code while reducing the computational complexity, it can bring great benefits to the application of the polar code in the digital communication system significantly.","PeriodicalId":164163,"journal":{"name":"2019 IEEE 4th Advanced Information Technology, Electronic and Automation Control Conference (IAEAC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129808933","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Pedestrian detection method based on self-learning 基于自学习的行人检测方法
Tong Liu, Jianghua Cheng, Mingsheng Yang, Xiangyu Du, Xiaobing Luo, Liang Zhang
Vision-based pedestrian detection technology is widely used in security surveillance, such as transportation, prisons, and important places. Security monitoring requires pedestrian detection not only to be accurate and reliable, but also to meet the needs of real-time monitoring, and the false alarm rate is low. The existing pedestrian learning method based on deep learning has high reliability, but the timeliness cannot meet the monitoring requirements. Traditional pedestrian detection methods are time-sensitive, but false alarm rates tend to be higher. This paper proposes a self-learning pedestrian detection method, combined with motion detection, HOG feature extraction, and SVM classification for preliminary pedestrian detection. The false alarms caused during the pedestrian detection process are manually confirmed, and then the system automatically detects the false alarm image at a specific time. Self-learning, retraining the classifier, so as to continuously reduce the pedestrian detection false alarm rate and improve the pedestrian detection performance index through self-learning during the system operation, and the timeliness can meet the needs of video surveillance. Experiments show that the false alarm rate of this method is low, timeliness is high, and the recognition rate is also high.
基于视觉的行人检测技术广泛应用于交通、监狱、重要场所等安防监控中。安防监控要求行人检测不仅要准确可靠,而且要满足实时监控的需要,虚警率要低。现有基于深度学习的行人学习方法可靠性高,但实时性不能满足监控要求。传统的行人检测方法对时间敏感,但虚警率往往较高。本文提出了一种自学习行人检测方法,结合运动检测、HOG特征提取和SVM分类对行人进行初步检测。对行人检测过程中产生的虚警进行人工确认,然后系统在特定时间自动检测出虚警图像。自学习,对分类器进行再训练,从而在系统运行过程中通过自学习不断降低行人检测虚警率,提高行人检测性能指标,及时性能够满足视频监控的需求。实验表明,该方法的虚警率低,及时性高,识别率也高。
{"title":"Pedestrian detection method based on self-learning","authors":"Tong Liu, Jianghua Cheng, Mingsheng Yang, Xiangyu Du, Xiaobing Luo, Liang Zhang","doi":"10.1109/IAEAC47372.2019.8997629","DOIUrl":"https://doi.org/10.1109/IAEAC47372.2019.8997629","url":null,"abstract":"Vision-based pedestrian detection technology is widely used in security surveillance, such as transportation, prisons, and important places. Security monitoring requires pedestrian detection not only to be accurate and reliable, but also to meet the needs of real-time monitoring, and the false alarm rate is low. The existing pedestrian learning method based on deep learning has high reliability, but the timeliness cannot meet the monitoring requirements. Traditional pedestrian detection methods are time-sensitive, but false alarm rates tend to be higher. This paper proposes a self-learning pedestrian detection method, combined with motion detection, HOG feature extraction, and SVM classification for preliminary pedestrian detection. The false alarms caused during the pedestrian detection process are manually confirmed, and then the system automatically detects the false alarm image at a specific time. Self-learning, retraining the classifier, so as to continuously reduce the pedestrian detection false alarm rate and improve the pedestrian detection performance index through self-learning during the system operation, and the timeliness can meet the needs of video surveillance. Experiments show that the false alarm rate of this method is low, timeliness is high, and the recognition rate is also high.","PeriodicalId":164163,"journal":{"name":"2019 IEEE 4th Advanced Information Technology, Electronic and Automation Control Conference (IAEAC)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128495889","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Comprehensive Diagnosis and Analysis of Early Damp Defects On a Single Section of EHV 750kV Arrester 超高压750kV避雷器单段早期阻尼缺陷综合诊断与分析
Yunxiao Bai, Libing Zhou, Huiting Yang, Wenhua Luo, Wentao Chen, Longxiang Yuan
With the extention of the arrester’s running time, there appears the situation that a single section of extrahigh voltage 750kV four series surge arrester may get damp and deteriorated.Once subjected to over-voltage intrusion, a serious situation may even lead to a single section of arrester’s explosion, which will bring a very negative impact to the system over-voltage protection.Through the on-line monitoring of the arrester, it is found that the leakage current of an ultrahigh voltage 750kV arrester became over-limited, we carried out full current and resistive current live detection for the whole arrester and blackout test for single section.We analyzed the data and disintegrated the single section. It is concluded that, for the extrahigh voltage 750kV four series surge arrester, especially for early hidden defects, in terms of live detection, it should be effective to combine the on-line monitoring of arrester, live detection, we should pay attention to data accumulation and development trend.In terms of blackout test, DC leakage test is still the most reliable way to diagnose the arrester defect. Therefore, we should strengthen the on-line monitoring and charge detection data accumulation,and also focus on the development trend and combine with the blackout plan to carry out the DC leakage test actively. In this way we can detect early latent fault of single-stage arrester in time, and provide over-voltage protection correctly.
随着避雷器使用时间的延长,出现了特高压750kV四串联避雷器单段受潮变质的情况。一旦受到过电压侵入,严重的情况下甚至可能导致避雷器单段发生爆炸,对系统过电压保护带来非常不利的影响。通过对某超高压750kV避雷器的在线监测,发现避雷器的漏电流出现过限现象,对整个避雷器进行了全电流和阻性电流的活检,对单段避雷器进行了断电试验。我们分析了数据并分解了单个部分。得出结论,对于特高压750kV四串联避雷器,特别是对于早期隐藏缺陷,在带电检测方面,应将避雷器的在线监测、带电检测相结合,应注意数据的积累和发展趋势。在停电试验方面,直流漏电试验仍然是诊断避雷器缺陷最可靠的方法。因此,既要加强在线监测和充电检测数据积累,又要关注发展趋势,结合停电预案积极开展直流漏电试验。这样可以及时发现单级避雷器的早期潜在故障,正确提供过电压保护。
{"title":"Comprehensive Diagnosis and Analysis of Early Damp Defects On a Single Section of EHV 750kV Arrester","authors":"Yunxiao Bai, Libing Zhou, Huiting Yang, Wenhua Luo, Wentao Chen, Longxiang Yuan","doi":"10.1109/IAEAC47372.2019.8997821","DOIUrl":"https://doi.org/10.1109/IAEAC47372.2019.8997821","url":null,"abstract":"With the extention of the arrester’s running time, there appears the situation that a single section of extrahigh voltage 750kV four series surge arrester may get damp and deteriorated.Once subjected to over-voltage intrusion, a serious situation may even lead to a single section of arrester’s explosion, which will bring a very negative impact to the system over-voltage protection.Through the on-line monitoring of the arrester, it is found that the leakage current of an ultrahigh voltage 750kV arrester became over-limited, we carried out full current and resistive current live detection for the whole arrester and blackout test for single section.We analyzed the data and disintegrated the single section. It is concluded that, for the extrahigh voltage 750kV four series surge arrester, especially for early hidden defects, in terms of live detection, it should be effective to combine the on-line monitoring of arrester, live detection, we should pay attention to data accumulation and development trend.In terms of blackout test, DC leakage test is still the most reliable way to diagnose the arrester defect. Therefore, we should strengthen the on-line monitoring and charge detection data accumulation,and also focus on the development trend and combine with the blackout plan to carry out the DC leakage test actively. In this way we can detect early latent fault of single-stage arrester in time, and provide over-voltage protection correctly.","PeriodicalId":164163,"journal":{"name":"2019 IEEE 4th Advanced Information Technology, Electronic and Automation Control Conference (IAEAC)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129829338","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An incremental Bayesian network structure learning algorithm based on local updating strategy 一种基于局部更新策略的增量贝叶斯网络结构学习算法
Dan Liu, Jie Wu, Lin Liang, Xiaowan Li, Chunguang Luo, Guanghua Xu
Bayesian network is wildly applied in AI field, but current structure learning algorithms consume a significant amount of time when faced with big data. We propose an incremental algorithm based on local updating strategy. First, we adopted a balanced decomposition for the structure, found the sub-network needed to be updated, and updated it to obtain the new network. Then we did simulation experiments to verify the validity of our method. Finally, we compared the efficiency and accuracy of our method with that of other mainstream algorithms. The result shows that our method runs in a low constant time, and its average accuracy of structure learning reaches 98%.
贝叶斯网络在人工智能领域得到了广泛的应用,但目前的结构学习算法在面对大数据时耗费了大量的时间。提出了一种基于局部更新策略的增量算法。首先,我们对结构进行平衡分解,找到需要更新的子网,并对其进行更新,得到新的网络。通过仿真实验验证了该方法的有效性。最后,将本文方法的效率和精度与其他主流算法进行了比较。结果表明,该方法在较低的常数时间内运行,结构学习的平均准确率达到98%。
{"title":"An incremental Bayesian network structure learning algorithm based on local updating strategy","authors":"Dan Liu, Jie Wu, Lin Liang, Xiaowan Li, Chunguang Luo, Guanghua Xu","doi":"10.1109/IAEAC47372.2019.8997724","DOIUrl":"https://doi.org/10.1109/IAEAC47372.2019.8997724","url":null,"abstract":"Bayesian network is wildly applied in AI field, but current structure learning algorithms consume a significant amount of time when faced with big data. We propose an incremental algorithm based on local updating strategy. First, we adopted a balanced decomposition for the structure, found the sub-network needed to be updated, and updated it to obtain the new network. Then we did simulation experiments to verify the validity of our method. Finally, we compared the efficiency and accuracy of our method with that of other mainstream algorithms. The result shows that our method runs in a low constant time, and its average accuracy of structure learning reaches 98%.","PeriodicalId":164163,"journal":{"name":"2019 IEEE 4th Advanced Information Technology, Electronic and Automation Control Conference (IAEAC)","volume":"94 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127319868","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Topology Optimization of Complex Network based on NSGA-II 基于NSGA-II的复杂网络拓扑优化
Zhang Bin, Gan Zhi-chun, Chen-Hsing Wen, Hu Qiang-qiang, Hou Jian-feng
This paper proposes a complex network topology optimization method based on NSGA-II with degrees and edges number unchanged. The method selects the elite parent networks by applying non-dominated layer sorting and congestion degree calculation through the network crossover and mutation operation to achieve maximum network efficiency and network invulnerability. Simulation analysis shows that the method can significantly improve the invulnerability and network efficiency of the initial networks at the same time. Optimizing the network efficiency makes the network connection show a negative correlation. The network presents a "multi-core decentralized" structure; optimizing the network invulnerability makes the connection show a positive correlation, the network presents a "close core and scattered periphery" structure; the cooperative optimization makes the network present a "tighter core and large periphery" structure, which is proved with good theoretical generality and practical application value.
本文提出了一种基于NSGA-II的复杂网络拓扑优化方法,其度和边数不变。该方法通过网络交叉和变异操作,采用非支配层排序和拥塞度计算来选择精英父网络,以达到最大的网络效率和网络的不受伤害性。仿真分析表明,该方法能显著提高初始网络的抗毁性和网络效率。优化网络效率使网络连接呈负相关关系。网络呈现“多核去中心化”结构;优化网络抗毁性使网络连接呈正相关关系,网络呈现“核心紧密、外围分散”的结构;协同优化使网络呈现出“核心更紧、外围更大”的结构,具有良好的理论通用性和实际应用价值。
{"title":"Topology Optimization of Complex Network based on NSGA-II","authors":"Zhang Bin, Gan Zhi-chun, Chen-Hsing Wen, Hu Qiang-qiang, Hou Jian-feng","doi":"10.1109/IAEAC47372.2019.8997597","DOIUrl":"https://doi.org/10.1109/IAEAC47372.2019.8997597","url":null,"abstract":"This paper proposes a complex network topology optimization method based on NSGA-II with degrees and edges number unchanged. The method selects the elite parent networks by applying non-dominated layer sorting and congestion degree calculation through the network crossover and mutation operation to achieve maximum network efficiency and network invulnerability. Simulation analysis shows that the method can significantly improve the invulnerability and network efficiency of the initial networks at the same time. Optimizing the network efficiency makes the network connection show a negative correlation. The network presents a \"multi-core decentralized\" structure; optimizing the network invulnerability makes the connection show a positive correlation, the network presents a \"close core and scattered periphery\" structure; the cooperative optimization makes the network present a \"tighter core and large periphery\" structure, which is proved with good theoretical generality and practical application value.","PeriodicalId":164163,"journal":{"name":"2019 IEEE 4th Advanced Information Technology, Electronic and Automation Control Conference (IAEAC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130014037","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2019 IEEE 4th Advanced Information Technology, Electronic and Automation Control Conference (IAEAC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1