Pub Date : 2018-12-01DOI: 10.1109/IICSPI.2018.8690452
Jiang Wenman, Zhou Zhen, Qi Jia, Ma Dezhong
so far, there is a question about the existing study of electromagnetic relay’s life prediction: they mainly focused on the research of batch products as a whole, which cannot reflect individual differences. This paper proposes one kind of way about the life prediction of electromagnetic relay based on Bayesian method. Firstly, a prior distribution of the model parameters is determined on the basis of the determined degradation model. Then, the degradation data (contact resistance) based on the prior distribution is fused, and the parameters of the degenerate trajectory model are updated to obtain the reliability function. Finally, we can predict the lifetime of a single electromagnetic relay. The results show that the lifetime prediction of a single electromagnetic relay is realized by the Bayesian method, in which the No.10 electromagnetic relay predicts the life of the electromagnetic relay to be $1.28 times 10^{5}$ times and the relative error is 0.06 for the test lifetime value is $1.21 times 10^{5}$ times under the condition of a reliability of 90%. The feasibility of predicting the lifetime of a single electromagnetic relay using fusion degradation data is verified
{"title":"Life Prediction of Electromagnetic Relay Based on Bayesian Method","authors":"Jiang Wenman, Zhou Zhen, Qi Jia, Ma Dezhong","doi":"10.1109/IICSPI.2018.8690452","DOIUrl":"https://doi.org/10.1109/IICSPI.2018.8690452","url":null,"abstract":"so far, there is a question about the existing study of electromagnetic relay’s life prediction: they mainly focused on the research of batch products as a whole, which cannot reflect individual differences. This paper proposes one kind of way about the life prediction of electromagnetic relay based on Bayesian method. Firstly, a prior distribution of the model parameters is determined on the basis of the determined degradation model. Then, the degradation data (contact resistance) based on the prior distribution is fused, and the parameters of the degenerate trajectory model are updated to obtain the reliability function. Finally, we can predict the lifetime of a single electromagnetic relay. The results show that the lifetime prediction of a single electromagnetic relay is realized by the Bayesian method, in which the No.10 electromagnetic relay predicts the life of the electromagnetic relay to be $1.28 times 10^{5}$ times and the relative error is 0.06 for the test lifetime value is $1.21 times 10^{5}$ times under the condition of a reliability of 90%. The feasibility of predicting the lifetime of a single electromagnetic relay using fusion degradation data is verified","PeriodicalId":6673,"journal":{"name":"2018 IEEE International Conference of Safety Produce Informatization (IICSPI)","volume":"110 1","pages":"340-345"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75031242","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-12-01DOI: 10.1109/IICSPI.2018.8690336
Minhao Hu, Haibin Wang, Qi Wang, Wei Yang, Ming Gao
This paper presents a method for checking the status of isolators, which is applied in the sequence control in smart substation based on mobile substation inspection robot (PowerRobot). It can recognize the status of an isolator through analyzing the features. The homography matrix can be obtained by using the SIFT feature between the template image and new acquired image. Then it gets the range of isolator, finally recognizing the status of isolator by image processing. The experiment results prove that the method could recognize the isolator status effectively. The substation realizes one key sequence control system through this technology based substation inspection robot.
{"title":"Status Recognition of Isolator Technology Based on Substation Inspection Robot","authors":"Minhao Hu, Haibin Wang, Qi Wang, Wei Yang, Ming Gao","doi":"10.1109/IICSPI.2018.8690336","DOIUrl":"https://doi.org/10.1109/IICSPI.2018.8690336","url":null,"abstract":"This paper presents a method for checking the status of isolators, which is applied in the sequence control in smart substation based on mobile substation inspection robot (PowerRobot). It can recognize the status of an isolator through analyzing the features. The homography matrix can be obtained by using the SIFT feature between the template image and new acquired image. Then it gets the range of isolator, finally recognizing the status of isolator by image processing. The experiment results prove that the method could recognize the isolator status effectively. The substation realizes one key sequence control system through this technology based substation inspection robot.","PeriodicalId":6673,"journal":{"name":"2018 IEEE International Conference of Safety Produce Informatization (IICSPI)","volume":"18 1","pages":"728-732"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75248564","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-12-01DOI: 10.1109/iicspi.2018.8690398
Liwei Jia, Xiaoming Shi, Kun Li
This paper presents K-Coverage algorithm based on network model in wireless sensor network, firstly, establish the affiliation between the sensor nodes and target nodes through the network model, present a method to compute the coverage expected value of the monitoring area; secondly, in the network energy conversion, using scheduling mechanism in sensor nodes to attain the network energy balance, and achieve different network coverage quality through different nodes energy conversion. Finally, simulation results show that K-coverage algorithm can effectively reduce the number of active nodes meeting certain coverage requirements and then improve the network lifetime.
{"title":"K-Coverage Algorithm Based on Network Model in Wireless Sensor Network","authors":"Liwei Jia, Xiaoming Shi, Kun Li","doi":"10.1109/iicspi.2018.8690398","DOIUrl":"https://doi.org/10.1109/iicspi.2018.8690398","url":null,"abstract":"This paper presents K-Coverage algorithm based on network model in wireless sensor network, firstly, establish the affiliation between the sensor nodes and target nodes through the network model, present a method to compute the coverage expected value of the monitoring area; secondly, in the network energy conversion, using scheduling mechanism in sensor nodes to attain the network energy balance, and achieve different network coverage quality through different nodes energy conversion. Finally, simulation results show that K-coverage algorithm can effectively reduce the number of active nodes meeting certain coverage requirements and then improve the network lifetime.","PeriodicalId":6673,"journal":{"name":"2018 IEEE International Conference of Safety Produce Informatization (IICSPI)","volume":"5 1","pages":"367-370"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75559297","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-12-01DOI: 10.1109/IICSPI.2018.8690390
Huang Song, Qiu Jianlin
To solve the problem that low efficiency and slow convergence speed of traditional attribute reduction algorithm, we propose an attribute reduction algorithm which based on the genetic algorithm and rough sets. To obtain the minimum attribute reduction, attribute dependence and hamming distance as constrains is introduced in population initialization. When the fitness function is designed, the average attribute importance is introduced as the correction factor, and the fitness function is dynamically adjusted. The improved adaptive crossover and mutation probability are adopted, and in the cross-operation, a small-scale competition strategy is used. Experimental results prove the efficiency of the proposed algorithm in attribute reduction for high dimensionality and big data.
{"title":"An Attribute Reduction Based on Genetic Algorithm and Rough Sets","authors":"Huang Song, Qiu Jianlin","doi":"10.1109/IICSPI.2018.8690390","DOIUrl":"https://doi.org/10.1109/IICSPI.2018.8690390","url":null,"abstract":"To solve the problem that low efficiency and slow convergence speed of traditional attribute reduction algorithm, we propose an attribute reduction algorithm which based on the genetic algorithm and rough sets. To obtain the minimum attribute reduction, attribute dependence and hamming distance as constrains is introduced in population initialization. When the fitness function is designed, the average attribute importance is introduced as the correction factor, and the fitness function is dynamically adjusted. The improved adaptive crossover and mutation probability are adopted, and in the cross-operation, a small-scale competition strategy is used. Experimental results prove the efficiency of the proposed algorithm in attribute reduction for high dimensionality and big data.","PeriodicalId":6673,"journal":{"name":"2018 IEEE International Conference of Safety Produce Informatization (IICSPI)","volume":"189 1","pages":"788-792"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77781561","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-12-01DOI: 10.1109/IICSPI.2018.8690363
Li Wencui, Liu Yan, W. Shiwen, Li Xiong, Shu Xin-jian, Dang Fangfang
In order to improve the information safety risk prevention and control ability and guarantee the safe, stable and effective operation of power network, this paper constructed an information safety prevention and control system of power grid enterprise which was based on artificial intelligence. This system quantified the information security risk pointer and realize information security state intelligent. It innovated the information security risks management model and brought the concept of information security state pointer into security risk management, qualified the information security state pointer, show them in the information security management system visually and concisely by the method of indicator. Based on these, the sub-companies regulated the scientific plan and realized an all-round management from before-hand, intermediate to afterwards. After operation and practice, this system can not only saved the cost of equipment maintenance, but also promoted the assets using efficiency and labor cost. It improved the performance and integrated operation level greatly of information network.
{"title":"An Information Security Prevention System of Power Grid Enterprises Based on Artificial Intelligence","authors":"Li Wencui, Liu Yan, W. Shiwen, Li Xiong, Shu Xin-jian, Dang Fangfang","doi":"10.1109/IICSPI.2018.8690363","DOIUrl":"https://doi.org/10.1109/IICSPI.2018.8690363","url":null,"abstract":"In order to improve the information safety risk prevention and control ability and guarantee the safe, stable and effective operation of power network, this paper constructed an information safety prevention and control system of power grid enterprise which was based on artificial intelligence. This system quantified the information security risk pointer and realize information security state intelligent. It innovated the information security risks management model and brought the concept of information security state pointer into security risk management, qualified the information security state pointer, show them in the information security management system visually and concisely by the method of indicator. Based on these, the sub-companies regulated the scientific plan and realized an all-round management from before-hand, intermediate to afterwards. After operation and practice, this system can not only saved the cost of equipment maintenance, but also promoted the assets using efficiency and labor cost. It improved the performance and integrated operation level greatly of information network.","PeriodicalId":6673,"journal":{"name":"2018 IEEE International Conference of Safety Produce Informatization (IICSPI)","volume":"55 1","pages":"148-152"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76248087","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-12-01DOI: 10.1109/iicspi.2018.8690345
Wang Ying, Liang Kai, Liu Qi, Li Shuo, Li Tingting, Liu Jinran
There are plenty of interference sources in the operation of the single-chip microcomputer control system, which will affect the operation of the system. This paper mainly discusses advantages and disadvantages of the mainstream software in anti-jamming technique, and analyzes the disadvantages of the existing software anti-jam anti-jamming technique using the combination of the C language and other several assembly languages for its improvement. The application of the software anti-jamming technique has improved the reliability of the control system effectively and saved the system computing time, resulting in its wide application.
{"title":"Software Anti-Interference Technology of Single Chip Microcomputer Control System","authors":"Wang Ying, Liang Kai, Liu Qi, Li Shuo, Li Tingting, Liu Jinran","doi":"10.1109/iicspi.2018.8690345","DOIUrl":"https://doi.org/10.1109/iicspi.2018.8690345","url":null,"abstract":"There are plenty of interference sources in the operation of the single-chip microcomputer control system, which will affect the operation of the system. This paper mainly discusses advantages and disadvantages of the mainstream software in anti-jamming technique, and analyzes the disadvantages of the existing software anti-jam anti-jamming technique using the combination of the C language and other several assembly languages for its improvement. The application of the software anti-jamming technique has improved the reliability of the control system effectively and saved the system computing time, resulting in its wide application.","PeriodicalId":6673,"journal":{"name":"2018 IEEE International Conference of Safety Produce Informatization (IICSPI)","volume":"7 1","pages":"816-820"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78702234","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-12-01DOI: 10.1109/IICSPI.2018.8690496
Wenyang Li, M. Jiang
In this paper, we propose a novel image segmentation algorithm, Fuzzy-Based Differential Lion Pride optimization (FDLPO). We combine the concept of the Fuzzy C Means (FCM) and an improved Lion Pride optimization (DLPO) with a new crossover strategy which is inspired by Differential Evolution (DE). First, we search for optimum clusters by fuzzy membership function and LPO which has better performance than most of the other algorithms. Then, the crossover mechanism of the differential evolution is used to improve the diversity of offspring and speed up convergence in lion pride optimization. FDLPO becomes more efficient as it overcomes the drawbacks of FCM and LPO which does not depend on the choice of initial cluster centers and it performs better in terms of convergence, time complexity and robustness. The experiments with DLPO, LPO and PSO are executed over some benchmark test functions. Meanwhile, the efficiency of FDLPO is proven by both quantitative and qualitative measures.
{"title":"Fuzzy-Based Lion Pride optimization for Grayscale Image Segmentation","authors":"Wenyang Li, M. Jiang","doi":"10.1109/IICSPI.2018.8690496","DOIUrl":"https://doi.org/10.1109/IICSPI.2018.8690496","url":null,"abstract":"In this paper, we propose a novel image segmentation algorithm, Fuzzy-Based Differential Lion Pride optimization (FDLPO). We combine the concept of the Fuzzy C Means (FCM) and an improved Lion Pride optimization (DLPO) with a new crossover strategy which is inspired by Differential Evolution (DE). First, we search for optimum clusters by fuzzy membership function and LPO which has better performance than most of the other algorithms. Then, the crossover mechanism of the differential evolution is used to improve the diversity of offspring and speed up convergence in lion pride optimization. FDLPO becomes more efficient as it overcomes the drawbacks of FCM and LPO which does not depend on the choice of initial cluster centers and it performs better in terms of convergence, time complexity and robustness. The experiments with DLPO, LPO and PSO are executed over some benchmark test functions. Meanwhile, the efficiency of FDLPO is proven by both quantitative and qualitative measures.","PeriodicalId":6673,"journal":{"name":"2018 IEEE International Conference of Safety Produce Informatization (IICSPI)","volume":"188 1","pages":"600-604"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79397369","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-12-01DOI: 10.1109/IICSPI.2018.8690458
Chao Zhou, Ziying Wang, Wei Huang, Yajuan Guo
In view of all kinds of network attacks which may affect the network security of the smart grid system, an attack detection algorithm is proposed, feature extraction and training to the data such as server logs is carried out based on Hidden Markov model (HMM) to achieve the network attack detection in smart grid system. By the proposed algorithm, analysis on real data of the smart grid system in one power company is carried out, which can effectively identify common types and numbers of network attack types. Through the proposed smart grid network attack detection algorithm, network security risks in the smart grid system can be found, and the level of network security is improved.
{"title":"Research on Network Security Attack Detection Algorithm in Smart Grid System","authors":"Chao Zhou, Ziying Wang, Wei Huang, Yajuan Guo","doi":"10.1109/IICSPI.2018.8690458","DOIUrl":"https://doi.org/10.1109/IICSPI.2018.8690458","url":null,"abstract":"In view of all kinds of network attacks which may affect the network security of the smart grid system, an attack detection algorithm is proposed, feature extraction and training to the data such as server logs is carried out based on Hidden Markov model (HMM) to achieve the network attack detection in smart grid system. By the proposed algorithm, analysis on real data of the smart grid system in one power company is carried out, which can effectively identify common types and numbers of network attack types. Through the proposed smart grid network attack detection algorithm, network security risks in the smart grid system can be found, and the level of network security is improved.","PeriodicalId":6673,"journal":{"name":"2018 IEEE International Conference of Safety Produce Informatization (IICSPI)","volume":"1 1","pages":"261-264"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89453494","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-12-01DOI: 10.1109/IICSPI.2018.8690376
Xiangjun Su, Jingui Li, Jing Zeng, Sheng Hu
With the rapid development of social economy and modern technology, people have shown unprecedented concern about the safety needs of civil aviation travel. The ADS-B system has been gradually adopted by more and more countries in the world because of its high positioning accuracy, fast data update, low cost of building stations, and no low-altitude blind spots. This paper uses the self-developed KZ-SDR-ED software radio development platform to design an ADS-B all-digital software receiver, which receives the broadcast signals of multiple civil aircraft within 100km and follows the message format of ADS-B signals. It is decoded to obtain operational parameters such as speed, altitude, latitude and longitude coordinates of the civil aircraft, and the four-dimensional position and navigation trajectory of the aircraft are displayed in real time through an intuitive GUI interface.
{"title":"SDR Reception and Analysis of Civil Aviation ADS-B Signals","authors":"Xiangjun Su, Jingui Li, Jing Zeng, Sheng Hu","doi":"10.1109/IICSPI.2018.8690376","DOIUrl":"https://doi.org/10.1109/IICSPI.2018.8690376","url":null,"abstract":"With the rapid development of social economy and modern technology, people have shown unprecedented concern about the safety needs of civil aviation travel. The ADS-B system has been gradually adopted by more and more countries in the world because of its high positioning accuracy, fast data update, low cost of building stations, and no low-altitude blind spots. This paper uses the self-developed KZ-SDR-ED software radio development platform to design an ADS-B all-digital software receiver, which receives the broadcast signals of multiple civil aircraft within 100km and follows the message format of ADS-B signals. It is decoded to obtain operational parameters such as speed, altitude, latitude and longitude coordinates of the civil aircraft, and the four-dimensional position and navigation trajectory of the aircraft are displayed in real time through an intuitive GUI interface.","PeriodicalId":6673,"journal":{"name":"2018 IEEE International Conference of Safety Produce Informatization (IICSPI)","volume":"69 1","pages":"893-896"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80349344","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-12-01DOI: 10.1109/IICSPI.2018.8690510
Huihui Han, Xin Luo, Tao Yang, Youqun Shi
As the information of online music resources continues to grow, it becomes more and more difficult for users to find their favorite music. Accurate and efficient music recommendation is very important. Music recommendation is a research hotspot in the field of speech processing. Calculate the mel frequency cepstral coefficient (MFCC) feature quantity by analyzing the characteristics of music content. Then, the feature quantities are clustered to compress the music feature values. Finally, the distance metric function is used to calculate the similarity between all music in the feature value database of the searched music. The closer the distance is, the higher the similarity is. According to the similarity, we can get the result of recommendation. The method recommended results have higher accuracy in experiments and provides an idea for music recommendations when user data is missing.
{"title":"Music Recommendation Based on Feature Similarity","authors":"Huihui Han, Xin Luo, Tao Yang, Youqun Shi","doi":"10.1109/IICSPI.2018.8690510","DOIUrl":"https://doi.org/10.1109/IICSPI.2018.8690510","url":null,"abstract":"As the information of online music resources continues to grow, it becomes more and more difficult for users to find their favorite music. Accurate and efficient music recommendation is very important. Music recommendation is a research hotspot in the field of speech processing. Calculate the mel frequency cepstral coefficient (MFCC) feature quantity by analyzing the characteristics of music content. Then, the feature quantities are clustered to compress the music feature values. Finally, the distance metric function is used to calculate the similarity between all music in the feature value database of the searched music. The closer the distance is, the higher the similarity is. According to the similarity, we can get the result of recommendation. The method recommended results have higher accuracy in experiments and provides an idea for music recommendations when user data is missing.","PeriodicalId":6673,"journal":{"name":"2018 IEEE International Conference of Safety Produce Informatization (IICSPI)","volume":"38 1","pages":"650-654"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74942027","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}