首页 > 最新文献

2021 IEEE 4th Advanced Information Management, Communicates, Electronic and Automation Control Conference (IMCEC)最新文献

英文 中文
Fault Analysis of GIS Basin Insulator Based on Laser Ultrasonic Detection Technology 基于激光超声检测技术的GIS盆式绝缘子故障分析
Wen Wang, Yibin Gao, Gang Yang, Zhumao Lu, Guodong Li, Yuan Ren, Dawei Wang
GIS equipment is widely used in power network and its reliability directly affects the safe and stable operation of power network. In this paper, a case of breakdown fault of 220kV GIS basin insulator is analyzed deeply. The fault gas chamber position is determined according to the fault recording diagram, SF6 gas decomposition products and other fault characteristics. Combined with laser ultrasonic testing instrument and spot disintegration inspection, the reasons for breakdown of GIS busbar basin insulator are analyzed comprehensively. It is confirmed that the basin insulator has cracks caused by uneven tightening torque of nuts on both sides of flange and damp flange gap. The electric field is distorted at the crack, causing the discharge along the surface. Finally, according to the cause of the fault, the follow-up measures for this kind of fault are put forward.
GIS设备在电网中应用广泛,其可靠性直接影响电网的安全稳定运行。本文对一起220kV GIS盆式绝缘子击穿故障进行了深入分析。根据故障记录图、SF6气体分解产物等故障特征确定故障气室位置。结合激光超声检测仪和现场崩解检测,对GIS母线槽绝缘子击穿的原因进行了综合分析。确认盆型绝缘子有裂纹是由于法兰两侧螺母拧紧力矩不均匀和法兰间隙受潮所致。电场在裂纹处发生畸变,导致沿表面放电。最后,根据故障发生的原因,提出了该类故障的后续处理措施。
{"title":"Fault Analysis of GIS Basin Insulator Based on Laser Ultrasonic Detection Technology","authors":"Wen Wang, Yibin Gao, Gang Yang, Zhumao Lu, Guodong Li, Yuan Ren, Dawei Wang","doi":"10.1109/IMCEC51613.2021.9482147","DOIUrl":"https://doi.org/10.1109/IMCEC51613.2021.9482147","url":null,"abstract":"GIS equipment is widely used in power network and its reliability directly affects the safe and stable operation of power network. In this paper, a case of breakdown fault of 220kV GIS basin insulator is analyzed deeply. The fault gas chamber position is determined according to the fault recording diagram, SF6 gas decomposition products and other fault characteristics. Combined with laser ultrasonic testing instrument and spot disintegration inspection, the reasons for breakdown of GIS busbar basin insulator are analyzed comprehensively. It is confirmed that the basin insulator has cracks caused by uneven tightening torque of nuts on both sides of flange and damp flange gap. The electric field is distorted at the crack, causing the discharge along the surface. Finally, according to the cause of the fault, the follow-up measures for this kind of fault are put forward.","PeriodicalId":240400,"journal":{"name":"2021 IEEE 4th Advanced Information Management, Communicates, Electronic and Automation Control Conference (IMCEC)","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122858766","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Handwritten number recognition based on PCA and neural network 基于PCA和神经网络的手写体数字识别
Zhihong Hu, Q. Tian, Hongbo Wang, Zhenyu He
In recent years, Artificial Neural Network (ANN) has been widely used in digital handwriting recognition by virtue of its strong fault-tolerant ability and classification ability. However, in traditional recognition methods, taking the number of image pixels as the input number of neurons will cause problems such as long learning and training time and low efficiency. This paper combines principal component analysis (PCA) algorithm with BP algorithm for handwritten digit recognition. After image preprocessing, PCA algorithm is used to reduce dimension of original data. The first 10 principal components, the first 30 principal components, the first 45 principal components, and the first 60 principal components are sent to the neural network as input neurons for training. Then, the test data set was used for testing. Finally, the simulation was analyzed from three dimensions: training efficiency, learning time and identification accuracy. The results show that when the number of input neurons is 60 and the number of hidden layer neurons is 30, the highest recognition rate is only 0.13% lower than that of the number of input neurons is 784, but the training time of the neural network is reduced by 94 seconds, and the efficiency is improved by 32%. When the number of hidden layer neurons is 50, the highest recognition rate is only 0.25% lower than that of input neurons is 784, but the time is reduced by 237 seconds and the efficiency is improved by 63%. This design solves the problem of low learning efficiency in digital recognition well.
近年来,人工神经网络(Artificial Neural Network, ANN)以其较强的容错能力和分类能力在数字手写识别中得到了广泛的应用。然而,在传统的识别方法中,以图像像素个数作为神经元的输入个数,会导致学习训练时间长、效率低等问题。本文将主成分分析(PCA)算法与BP算法相结合,用于手写体数字识别。图像预处理后,采用PCA算法对原始数据进行降维处理。将前10个主成分、前30个主成分、前45个主成分、前60个主成分作为输入神经元送入神经网络进行训练。然后,使用测试数据集进行测试。最后,从训练效率、学习时间和识别精度三个维度对仿真进行了分析。结果表明,当输入神经元数为60、隐藏层神经元数为30时,最高识别率仅比输入神经元数为784时低0.13%,但神经网络的训练时间缩短了94秒,效率提高了32%。当隐藏层神经元数为50时,最高识别率仅比输入神经元784时低0.25%,但时间缩短了237秒,效率提高了63%。该设计很好地解决了数字识别中学习效率低的问题。
{"title":"Handwritten number recognition based on PCA and neural network","authors":"Zhihong Hu, Q. Tian, Hongbo Wang, Zhenyu He","doi":"10.1109/IMCEC51613.2021.9482278","DOIUrl":"https://doi.org/10.1109/IMCEC51613.2021.9482278","url":null,"abstract":"In recent years, Artificial Neural Network (ANN) has been widely used in digital handwriting recognition by virtue of its strong fault-tolerant ability and classification ability. However, in traditional recognition methods, taking the number of image pixels as the input number of neurons will cause problems such as long learning and training time and low efficiency. This paper combines principal component analysis (PCA) algorithm with BP algorithm for handwritten digit recognition. After image preprocessing, PCA algorithm is used to reduce dimension of original data. The first 10 principal components, the first 30 principal components, the first 45 principal components, and the first 60 principal components are sent to the neural network as input neurons for training. Then, the test data set was used for testing. Finally, the simulation was analyzed from three dimensions: training efficiency, learning time and identification accuracy. The results show that when the number of input neurons is 60 and the number of hidden layer neurons is 30, the highest recognition rate is only 0.13% lower than that of the number of input neurons is 784, but the training time of the neural network is reduced by 94 seconds, and the efficiency is improved by 32%. When the number of hidden layer neurons is 50, the highest recognition rate is only 0.25% lower than that of input neurons is 784, but the time is reduced by 237 seconds and the efficiency is improved by 63%. This design solves the problem of low learning efficiency in digital recognition well.","PeriodicalId":240400,"journal":{"name":"2021 IEEE 4th Advanced Information Management, Communicates, Electronic and Automation Control Conference (IMCEC)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131193001","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimization of small caliber projectile based on neural network 基于神经网络的小口径弹丸优化
Wen-Hou Ma, Yong Yu, Jun Hu
When small caliber projectile is moving at high speed underwater, the water around the projectile will cavitate. The geometric shape of the warhead with the best drag coefficient corresponds to the supercavitating state where the projectile is completely enveloped by cavitation. In this paper, aiming at a small-caliber projectile, the three-section cone is selected as the basic projectile, and the shape of the projectile is optimized with the drag coefficient as the optimization objective. The neural network and sequential quadratic programming (SQP) algorithm are combined to reduce the calculation amount in the optimization process and improve the optimization efficiency. The drag coefficient of the optimized projectile is reduced by about 40% compared with the projectile before optimization, and it can form a supercavitation that envelops the entire projectile.
小口径弹丸在水下高速运动时,弹丸周围的水会产生空化现象。阻力系数最佳的战斗部几何形状对应于弹丸完全被空泡包围的超空泡状态。本文针对小口径弹丸,选择三段锥作为基本弹丸,以阻力系数为优化目标对弹丸外形进行优化。将神经网络与序列二次规划(SQP)算法相结合,减少了优化过程中的计算量,提高了优化效率。优化后的弹丸阻力系数比优化前降低了约40%,并能形成包裹整个弹丸的超空泡。
{"title":"Optimization of small caliber projectile based on neural network","authors":"Wen-Hou Ma, Yong Yu, Jun Hu","doi":"10.1109/IMCEC51613.2021.9482069","DOIUrl":"https://doi.org/10.1109/IMCEC51613.2021.9482069","url":null,"abstract":"When small caliber projectile is moving at high speed underwater, the water around the projectile will cavitate. The geometric shape of the warhead with the best drag coefficient corresponds to the supercavitating state where the projectile is completely enveloped by cavitation. In this paper, aiming at a small-caliber projectile, the three-section cone is selected as the basic projectile, and the shape of the projectile is optimized with the drag coefficient as the optimization objective. The neural network and sequential quadratic programming (SQP) algorithm are combined to reduce the calculation amount in the optimization process and improve the optimization efficiency. The drag coefficient of the optimized projectile is reduced by about 40% compared with the projectile before optimization, and it can form a supercavitation that envelops the entire projectile.","PeriodicalId":240400,"journal":{"name":"2021 IEEE 4th Advanced Information Management, Communicates, Electronic and Automation Control Conference (IMCEC)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131475686","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Exploration and application of 5G network slice in electric power 5G网络切片在电力领域的探索与应用
Qiang Zhang, Yaping Li, Zhijun Zhang, Peng Xie, Qingrui Guo, Xuerang Guo
The diversified demand for power business urgently needs to be realized through 5G network. Among them, network slicing technology can provide a "customized" virtual network according to different demands of the power system. Starting from the power grid business demand, this paper introduces the networking mode and key technologies of 5G slice technology in detail. And discussed the power end - to - end slicing solutions. The performance of 5G network slicing is evaluated based on the actual scenarios, and the influence of a different combination of network isolation methods on the performance of 5G network slicing is proposed. Finally, the application of 5G slicing technology in the power system is rationalized and prospected.
电力业务的多元化需求迫切需要通过5G网络来实现。其中,网络切片技术可以根据电力系统的不同需求提供“定制”的虚拟网络。本文从电网业务需求出发,详细介绍了5G切片技术的组网方式和关键技术。并讨论了功率端到端切片解决方案。基于实际场景对5G网络切片的性能进行了评估,并提出了不同网络隔离方法组合对5G网络切片性能的影响。最后,对5G切片技术在电力系统中的应用进行了合理化和展望。
{"title":"Exploration and application of 5G network slice in electric power","authors":"Qiang Zhang, Yaping Li, Zhijun Zhang, Peng Xie, Qingrui Guo, Xuerang Guo","doi":"10.1109/IMCEC51613.2021.9482150","DOIUrl":"https://doi.org/10.1109/IMCEC51613.2021.9482150","url":null,"abstract":"The diversified demand for power business urgently needs to be realized through 5G network. Among them, network slicing technology can provide a \"customized\" virtual network according to different demands of the power system. Starting from the power grid business demand, this paper introduces the networking mode and key technologies of 5G slice technology in detail. And discussed the power end - to - end slicing solutions. The performance of 5G network slicing is evaluated based on the actual scenarios, and the influence of a different combination of network isolation methods on the performance of 5G network slicing is proposed. Finally, the application of 5G slicing technology in the power system is rationalized and prospected.","PeriodicalId":240400,"journal":{"name":"2021 IEEE 4th Advanced Information Management, Communicates, Electronic and Automation Control Conference (IMCEC)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128107636","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Data-driven scheduling for smart shop floor via reinforcement learning with model-based clustering algorithm 基于模型聚类算法的强化学习智能车间数据驱动调度
Yuxin Li, Wenbin Gu, Xianliang Wang, Zeyu Chen
Various information technologies provide the manufacturing system massive data, which can support the decision optimization of product lifecycle management. However, the lack of effective use for advanced technologies prevents manufacturing industry from being automated and intelligent. Therefore, this paper proposes the smart shop floor and implementation mechanism. Meanwhile, based on the clustering and reinforcement learning, the brain agent and scheduling agent are designed to determine the approriate rule according to the shop floor state information, thus realizing the data-driven real-time scheduling. Experimental results show that the smart shop floor can effectively deal with disturbance events and has better performance compared with composite dispatching rules.
各种信息技术为制造系统提供海量数据,为产品生命周期管理的决策优化提供支持。然而,由于缺乏对先进技术的有效利用,阻碍了制造业的自动化和智能化。为此,本文提出了智能车间及其实现机制。同时,基于聚类和强化学习,设计大脑智能体和调度智能体,根据车间状态信息确定合适的规则,实现数据驱动的实时调度。实验结果表明,与复合调度规则相比,智能车间能够有效地处理干扰事件,具有更好的调度性能。
{"title":"Data-driven scheduling for smart shop floor via reinforcement learning with model-based clustering algorithm","authors":"Yuxin Li, Wenbin Gu, Xianliang Wang, Zeyu Chen","doi":"10.1109/IMCEC51613.2021.9482089","DOIUrl":"https://doi.org/10.1109/IMCEC51613.2021.9482089","url":null,"abstract":"Various information technologies provide the manufacturing system massive data, which can support the decision optimization of product lifecycle management. However, the lack of effective use for advanced technologies prevents manufacturing industry from being automated and intelligent. Therefore, this paper proposes the smart shop floor and implementation mechanism. Meanwhile, based on the clustering and reinforcement learning, the brain agent and scheduling agent are designed to determine the approriate rule according to the shop floor state information, thus realizing the data-driven real-time scheduling. Experimental results show that the smart shop floor can effectively deal with disturbance events and has better performance compared with composite dispatching rules.","PeriodicalId":240400,"journal":{"name":"2021 IEEE 4th Advanced Information Management, Communicates, Electronic and Automation Control Conference (IMCEC)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133256257","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Research on Information Security Release Scheme of Metro Intelligent Passenger Service 地铁智能客运服务信息安全发布方案研究
Weihui Zhao, Tongqing Sun, Xiaochen Wang
In order to ensure the security of service information release in metro, an information security release scheme was proposed at the software level based on the center and station control structure of passenger information system, considering the whole progress of editing, auditing, storage, transmission and display. Operation identity audit was realized through the face recognition technology and information encryption was realized through a hybrid encryption technology based on China commercial cryptographic algorithm. The scheme improves the reliability of information sources, privacy of data, security of operation, and avoids potential risks caused by illegal and politically sensitive information displayed on the terminal screen due to account leakage and data tampering and other malicious acts.
为了保证地铁业务信息发布的安全性,基于乘客信息系统的中心和站控结构,综合考虑编辑、审核、存储、传输和显示的全过程,提出了一种软件层面的信息安全发布方案。通过人脸识别技术实现操作身份审计,通过基于中国商用密码算法的混合加密技术实现信息加密。该方案提高了信息源的可靠性、数据的保密性、操作的安全性,避免了因账号泄露、数据篡改等恶意行为导致终端屏幕显示非法、政治敏感信息所带来的潜在风险。
{"title":"Research on Information Security Release Scheme of Metro Intelligent Passenger Service","authors":"Weihui Zhao, Tongqing Sun, Xiaochen Wang","doi":"10.1109/IMCEC51613.2021.9482155","DOIUrl":"https://doi.org/10.1109/IMCEC51613.2021.9482155","url":null,"abstract":"In order to ensure the security of service information release in metro, an information security release scheme was proposed at the software level based on the center and station control structure of passenger information system, considering the whole progress of editing, auditing, storage, transmission and display. Operation identity audit was realized through the face recognition technology and information encryption was realized through a hybrid encryption technology based on China commercial cryptographic algorithm. The scheme improves the reliability of information sources, privacy of data, security of operation, and avoids potential risks caused by illegal and politically sensitive information displayed on the terminal screen due to account leakage and data tampering and other malicious acts.","PeriodicalId":240400,"journal":{"name":"2021 IEEE 4th Advanced Information Management, Communicates, Electronic and Automation Control Conference (IMCEC)","volume":"119 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133674654","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Design of distributed temperature and humidity monitoring system based on single-chip microcomputer 基于单片机的分布式温湿度监测系统设计
Yue Li, Longqing Shi, Peihe Zhai, Deming Zhang, Haibin Fan
With the continuous development of electronic technology, large-scale centralized control technology has also been greatly improved, the traditional RS485 bus technology, in the equipment network performance, a bus can be hooked up to 32 node equipment, to a large extent, to meet a number of warehouses or monitoring stations of the centralized control requirements. However, because the longest transmission distance of the RS485 bus can reach 1200 meters, even after the relay can not transmit a few kilometers distance, it is difficult to meet the requirements of more remote monitoring and control. At present, Ethernet communication has been widely used in life and production, Ethernet wiring is also very extensive, so the Ethernet communication mode instead of RS485 bus transmission mode is more conducive to the realization of a wide range of remote distributed network system. In this paper, for temperature and humidity monitoring system, with the characteristics of Ethernet without rewiring and convenient installation, a distributed temperature and humidity monitoring system based on Ethernet is developed, and the single chip computer is used to collect nodes, and the temperature and humidity monitoring system is completed by the design of the minimum system, the design of temperature and humidity collection circuit, A/D conversion circuit, Then through the RS485 bus will have a separate address of the unit temperature and humidity monitoring system connected to a bus, through a RS485 to TCP/IP protocol converter can realize single-chip Ethernet communication, greenhouse data transmission to the PC, remote monitoring function.
随着电子技术的不断发展,大规模集中控制技术也得到了很大的提高,传统的RS485总线技术,在设备的网络性能上,一根总线可以接32个节点的设备,在很大程度上满足了多个仓库或监测站的集中控制要求。但是,由于RS485总线的最长传输距离可以达到1200米,即使经过继电器也无法传输几公里的距离,很难满足更加远程的监控要求。目前,以太网通信已经广泛应用于生活和生产中,以太网布线也非常广泛,因此以太网通信方式代替RS485总线传输方式更有利于实现大范围的远程分布式网络系统。本文针对温湿度监测系统,利用以太网无需重新布线、安装方便的特点,开发了一种基于以太网的分布式温湿度监测系统,采用单片机采集节点,通过最小系统的设计、温湿度采集电路的设计、a /D转换电路的设计、然后通过RS485总线将有单独地址的单元温湿度监控系统连接到总线上,通过RS485到TCP/IP协议转换器可以实现单片机以太网通信,将温室数据传输到PC机,实现远程监控功能。
{"title":"Design of distributed temperature and humidity monitoring system based on single-chip microcomputer","authors":"Yue Li, Longqing Shi, Peihe Zhai, Deming Zhang, Haibin Fan","doi":"10.1109/IMCEC51613.2021.9482261","DOIUrl":"https://doi.org/10.1109/IMCEC51613.2021.9482261","url":null,"abstract":"With the continuous development of electronic technology, large-scale centralized control technology has also been greatly improved, the traditional RS485 bus technology, in the equipment network performance, a bus can be hooked up to 32 node equipment, to a large extent, to meet a number of warehouses or monitoring stations of the centralized control requirements. However, because the longest transmission distance of the RS485 bus can reach 1200 meters, even after the relay can not transmit a few kilometers distance, it is difficult to meet the requirements of more remote monitoring and control. At present, Ethernet communication has been widely used in life and production, Ethernet wiring is also very extensive, so the Ethernet communication mode instead of RS485 bus transmission mode is more conducive to the realization of a wide range of remote distributed network system. In this paper, for temperature and humidity monitoring system, with the characteristics of Ethernet without rewiring and convenient installation, a distributed temperature and humidity monitoring system based on Ethernet is developed, and the single chip computer is used to collect nodes, and the temperature and humidity monitoring system is completed by the design of the minimum system, the design of temperature and humidity collection circuit, A/D conversion circuit, Then through the RS485 bus will have a separate address of the unit temperature and humidity monitoring system connected to a bus, through a RS485 to TCP/IP protocol converter can realize single-chip Ethernet communication, greenhouse data transmission to the PC, remote monitoring function.","PeriodicalId":240400,"journal":{"name":"2021 IEEE 4th Advanced Information Management, Communicates, Electronic and Automation Control Conference (IMCEC)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133736723","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Prediction of Emotional Tendency of COVID-19 Speech Based on Pre-training Model 基于预训练模型的COVID-19语音情绪倾向预测
Jian Huang
In 2020, the World Health Organization confirmed the new coronavirus (COVID-19) as a pandemic infectious disease. This virus affects the lives of tens of millions of people. Many countries have adopted compulsory measures to require residents to work and live at home and avoid unnecessary contact with the outside world. During this period, people expressed their feelings about the epidemic through various online platforms. In this article, we conducted an effective sentiment analysis on Weibo. These Weibo data are from January 1, 2020 to February 20, 2020, all related to COVID-19. The sentiment analysis of epidemic speech is to analyze people's views on COVID-19 during the epidemic. The results of the study concluded that although the epidemic is gradually getting worse, most people don't take a negative attitude.
2020年,世界卫生组织确认新型冠状病毒(COVID-19)为大流行传染病。这种病毒影响了数千万人的生命。许多国家都采取了强制措施,要求居民在家工作和生活,避免与外界不必要的接触。在此期间,人们通过各种网络平台表达了对疫情的感受。在本文中,我们对微博进行了有效的情感分析。这些微博数据是从2020年1月1日到2020年2月20日,都与COVID-19有关。疫情言论情绪分析是分析疫情期间人们对疫情的看法。研究结果表明,尽管疫情正在逐渐恶化,但大多数人并不持消极态度。
{"title":"Prediction of Emotional Tendency of COVID-19 Speech Based on Pre-training Model","authors":"Jian Huang","doi":"10.1109/IMCEC51613.2021.9482256","DOIUrl":"https://doi.org/10.1109/IMCEC51613.2021.9482256","url":null,"abstract":"In 2020, the World Health Organization confirmed the new coronavirus (COVID-19) as a pandemic infectious disease. This virus affects the lives of tens of millions of people. Many countries have adopted compulsory measures to require residents to work and live at home and avoid unnecessary contact with the outside world. During this period, people expressed their feelings about the epidemic through various online platforms. In this article, we conducted an effective sentiment analysis on Weibo. These Weibo data are from January 1, 2020 to February 20, 2020, all related to COVID-19. The sentiment analysis of epidemic speech is to analyze people's views on COVID-19 during the epidemic. The results of the study concluded that although the epidemic is gradually getting worse, most people don't take a negative attitude.","PeriodicalId":240400,"journal":{"name":"2021 IEEE 4th Advanced Information Management, Communicates, Electronic and Automation Control Conference (IMCEC)","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134317629","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A new Bi-level programming model for uncertain supply chain problems 不确定供应链问题的双层规划模型
Hanshi Shentu, Liuyang Yuan, Weibin Zhang
This paper focuses on a two-level supply chain coordination problem consisting of a single supplier and multiple manufacturers under an uncertain environment. Firstly, a new bi-level programming model is proposed. Secondly, an innovative two-stage stochastic planning is combined into the lower-level manufacturer model, and a Progressive Hedging Algorithm (PHA) is designed to solve it. Then, the solved solution is substituted into the upper-level model to find the optimal solution of the bi-level programming. Finally, numerical experiments are used to verify the feasibility of the model and the algorithm.
本文研究了不确定环境下由单个供应商和多个制造商组成的两级供应链协调问题。首先,提出了一种新的双层规划模型。其次,将一种创新的两阶段随机规划方法结合到下级制造商模型中,设计了一种渐进式对冲算法(Progressive Hedging Algorithm, PHA)进行求解。然后,将求解的解代入上层模型,求出双层规划的最优解。最后,通过数值实验验证了模型和算法的可行性。
{"title":"A new Bi-level programming model for uncertain supply chain problems","authors":"Hanshi Shentu, Liuyang Yuan, Weibin Zhang","doi":"10.1109/IMCEC51613.2021.9482174","DOIUrl":"https://doi.org/10.1109/IMCEC51613.2021.9482174","url":null,"abstract":"This paper focuses on a two-level supply chain coordination problem consisting of a single supplier and multiple manufacturers under an uncertain environment. Firstly, a new bi-level programming model is proposed. Secondly, an innovative two-stage stochastic planning is combined into the lower-level manufacturer model, and a Progressive Hedging Algorithm (PHA) is designed to solve it. Then, the solved solution is substituted into the upper-level model to find the optimal solution of the bi-level programming. Finally, numerical experiments are used to verify the feasibility of the model and the algorithm.","PeriodicalId":240400,"journal":{"name":"2021 IEEE 4th Advanced Information Management, Communicates, Electronic and Automation Control Conference (IMCEC)","volume":"190 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134269880","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on Prediction of Attack Behavior Based on HMM 基于HMM的攻击行为预测研究
Sen Jing, Min Li, Yue Sun, Yue Zhang
Compound attacks have become the most threatening form of network attacks. Intrusion detection systems can detect attacks but cannot predict attacks. In order to more accurately reflect the network security situation, this paper analyzes the shortcomings of traditional attack prediction algorithms, and proposes to establish a hidden Markov model based on the change of the host's security status with the change of the observation sequence. The Baum-Welch algorithm is used to optimize the configuration parameters of the evaluation model. Quantitative analysis is used to obtain the security situation of the entire network, and the parameters of the HMM model are optimized to make the calculation of the predicted attack probability more accurate and reduce the frequency of false alarms. In the experimental test based on real data, the feasibility of this method is verified.
复合攻击已经成为最具威胁性的网络攻击形式。入侵检测系统可以检测攻击,但不能预测攻击。为了更准确地反映网络安全状况,本文分析了传统攻击预测算法的不足,提出了基于主机安全状态随观测序列变化而变化的隐马尔可夫模型。采用Baum-Welch算法对评价模型的配置参数进行优化。通过定量分析获得整个网络的安全状况,并对HMM模型的参数进行优化,使预测攻击概率的计算更加准确,降低了虚警的发生频率。在基于实际数据的实验测试中,验证了该方法的可行性。
{"title":"Research on Prediction of Attack Behavior Based on HMM","authors":"Sen Jing, Min Li, Yue Sun, Yue Zhang","doi":"10.1109/IMCEC51613.2021.9482334","DOIUrl":"https://doi.org/10.1109/IMCEC51613.2021.9482334","url":null,"abstract":"Compound attacks have become the most threatening form of network attacks. Intrusion detection systems can detect attacks but cannot predict attacks. In order to more accurately reflect the network security situation, this paper analyzes the shortcomings of traditional attack prediction algorithms, and proposes to establish a hidden Markov model based on the change of the host's security status with the change of the observation sequence. The Baum-Welch algorithm is used to optimize the configuration parameters of the evaluation model. Quantitative analysis is used to obtain the security situation of the entire network, and the parameters of the HMM model are optimized to make the calculation of the predicted attack probability more accurate and reduce the frequency of false alarms. In the experimental test based on real data, the feasibility of this method is verified.","PeriodicalId":240400,"journal":{"name":"2021 IEEE 4th Advanced Information Management, Communicates, Electronic and Automation Control Conference (IMCEC)","volume":"90 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133150813","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2021 IEEE 4th Advanced Information Management, Communicates, Electronic and Automation Control Conference (IMCEC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1