2022 IEEE 6th Information Technology and Mechatronics Engineering Conference (ITOEC)最新文献

筛选
英文 中文
Energy-Efficient Multi-agent Cooperative Search Control Based on Deep Reinforcement Learning on Uneven Terrains 基于深度强化学习的非平坦地形节能多智能体协同搜索控制
2022 IEEE 6th Information Technology and Mechatronics Engineering Conference (ITOEC) Pub Date : 2022-03-04 DOI: 10.1109/ITOEC53115.2022.9734558
Bo Li, Hongyu Zhang, Jian Xiao, Shanli Zhong, Lei Wu, Xudong Wei
{"title":"Energy-Efficient Multi-agent Cooperative Search Control Based on Deep Reinforcement Learning on Uneven Terrains","authors":"Bo Li, Hongyu Zhang, Jian Xiao, Shanli Zhong, Lei Wu, Xudong Wei","doi":"10.1109/ITOEC53115.2022.9734558","DOIUrl":"https://doi.org/10.1109/ITOEC53115.2022.9734558","url":null,"abstract":"Anti-flocking algorithm for multi-agent to search a given area of interest(AOI) has been relatively mature. Multi-agent is basically used to search for uneven terrain, but the most existing anti-flocking algorithms are designed for flat terrain, so agents often use the shortest path to move between navigation targets. Using the shortest path to move in uneven terrain will consume more energy. At present, agents basically use portable energy to provide power, so we should try to reduce energy consumption. This brief proposes an energy-efficient multi-agent cooperative search control based on deep reinforcement learning on uneven terrains. The proposed algorithm selects the navigation target points through deep reinforcement learning, and encourages the agent to move between the navigation target points along the contour line. Simulation results show that the proposed control protocol is a promising energy-efficient solution for multi-agent operating on uneven terrains.","PeriodicalId":127300,"journal":{"name":"2022 IEEE 6th Information Technology and Mechatronics Engineering Conference (ITOEC)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115230121","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on Reactive Power Optimization of Distribution Network with Distributed Generation 分布式发电配电网无功优化研究
2022 IEEE 6th Information Technology and Mechatronics Engineering Conference (ITOEC) Pub Date : 2022-03-04 DOI: 10.1109/ITOEC53115.2022.9734541
Xiaomeng Wu, Fengyu Sun, Weidong Tian
{"title":"Research on Reactive Power Optimization of Distribution Network with Distributed Generation","authors":"Xiaomeng Wu, Fengyu Sun, Weidong Tian","doi":"10.1109/ITOEC53115.2022.9734541","DOIUrl":"https://doi.org/10.1109/ITOEC53115.2022.9734541","url":null,"abstract":"Due to its good environmental, social and economic benefits, the combination of distributed generation and centralized power generation has been the trend of power system development, but the randomness and intermittency of distributed generation have brought new problems to the system. For the reactive power optimization problem of distribution network with distributed generation, this study establishes a reactive power optimization model with the minimum active loss, the minimum voltage offset and the minimum average voltage offset as the multi-objectives. Different from most studies using weight to convert multi-objective into single-objective, this paper uses the multi-objective model of Pareto optimal solution, uses the improved non-dominated sorting differential evolution algorithm to determine the capacity of distributed generation, obtains a set of Pareto optimal solutions, and selects the compromise solution. Finally, taking IEEE33 - bus system as an example, the proposed model and algorithm are verified. The results show that the model and algorithm have certain reference value for reactive power optimization of distribution network.","PeriodicalId":127300,"journal":{"name":"2022 IEEE 6th Information Technology and Mechatronics Engineering Conference (ITOEC)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115311064","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Copy-Move Forgery Detection Algorithm based on Feature Point Clustering 基于特征点聚类的Copy-Move伪造检测算法
2022 IEEE 6th Information Technology and Mechatronics Engineering Conference (ITOEC) Pub Date : 2022-03-04 DOI: 10.1109/ITOEC53115.2022.9734556
Jiming Zheng, Kailang Zhang
{"title":"Copy-Move Forgery Detection Algorithm based on Feature Point Clustering","authors":"Jiming Zheng, Kailang Zhang","doi":"10.1109/ITOEC53115.2022.9734556","DOIUrl":"https://doi.org/10.1109/ITOEC53115.2022.9734556","url":null,"abstract":"Aiming at the high time complexity of the feature matching stage of the current copy-move forgery detection algorithm, an image copy-move forgery detection algorithm using structure tensor and HSV color model to cluster feature points is proposed. First, cluster the SIFT feature points based on the structure tensor, and divide all feature points into flat feature points, edge feature points, and corner feature points, which are divided into 3 clusters; Then, based on the clustering method of HSV color model, the feature points are divided into 63 clusters. Finally, feature matching is carried out in each cluster, which makes full use of the similarity of texture and color between the source region and the tampered region, effectively reduces the time of feature matching and improves the efficiency of the algorithm. Experimental results show that the proposed algorithm can effectively detect tampered areas, has a greater advantage in matching time, and has good robustness.","PeriodicalId":127300,"journal":{"name":"2022 IEEE 6th Information Technology and Mechatronics Engineering Conference (ITOEC)","volume":"2014 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127444189","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Design on One-cycle Control VIENNA Rectifier Based on FPGA 基于FPGA的单周期控制VIENNA整流器设计
2022 IEEE 6th Information Technology and Mechatronics Engineering Conference (ITOEC) Pub Date : 2022-03-04 DOI: 10.1109/ITOEC53115.2022.9734333
Gang Liu, Liyun Pan, Qiangang Sun
{"title":"Design on One-cycle Control VIENNA Rectifier Based on FPGA","authors":"Gang Liu, Liyun Pan, Qiangang Sun","doi":"10.1109/ITOEC53115.2022.9734333","DOIUrl":"https://doi.org/10.1109/ITOEC53115.2022.9734333","url":null,"abstract":"A realization scheme for the VIENNA rectifier based on Field Programmable Gate Array (FPGA) is proposed. Furthermore, the experimental platform is built by innovative using of FPGA to realize one-cycle control strategy. This method has more advantages such as high integration and high power density compared with discrete circuit. Meanwhile the synchronization of three-phase driving pulses based on FPGA parallel processing is superior to serial working mode.","PeriodicalId":127300,"journal":{"name":"2022 IEEE 6th Information Technology and Mechatronics Engineering Conference (ITOEC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124883551","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
PSO-SVM-based method for predicting the demand for airline material carriage 基于粒子群支持向量机的航空物资运输需求预测方法
2022 IEEE 6th Information Technology and Mechatronics Engineering Conference (ITOEC) Pub Date : 2022-03-04 DOI: 10.1109/ITOEC53115.2022.9734698
Ming Hao, Yun Wang, Xianfeng Zu
{"title":"PSO-SVM-based method for predicting the demand for airline material carriage","authors":"Ming Hao, Yun Wang, Xianfeng Zu","doi":"10.1109/ITOEC53115.2022.9734698","DOIUrl":"https://doi.org/10.1109/ITOEC53115.2022.9734698","url":null,"abstract":"As an important military aircraft material, with the increase in the number of off-site flight missions, it is inevitable to transfer to other sites for carrying security. With the increase of joint exercises, target training and other missions, the mission environment is complex and changeable, which puts forward higher requirements on the level of carry guarantee, among which the accurate prediction of the demand for aviation materials in the mission is one of the main elements of good carry guarantee. In this paper, we propose to use Support Vector Machine (SVM) to predict the number of aircraft materials to be carried, and apply the Particle Swarm Algorithm (PSO) to optimize the SVM parameters. By simulating and comparing PSO-SVM, GS-SVM and GA-SVM, the PSO-SVM algorithm is able to predict the airline material carrying requirements more accurately in a shorter period of time.","PeriodicalId":127300,"journal":{"name":"2022 IEEE 6th Information Technology and Mechatronics Engineering Conference (ITOEC)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125957996","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on Precision Positioning Control System of Punching Machine Feeding Device 冲床送料装置精密定位控制系统的研究
2022 IEEE 6th Information Technology and Mechatronics Engineering Conference (ITOEC) Pub Date : 2022-03-04 DOI: 10.1109/ITOEC53115.2022.9734694
Dang-feng Pang, Shigang Cui, Yongli Zhang
{"title":"Research on Precision Positioning Control System of Punching Machine Feeding Device","authors":"Dang-feng Pang, Shigang Cui, Yongli Zhang","doi":"10.1109/ITOEC53115.2022.9734694","DOIUrl":"https://doi.org/10.1109/ITOEC53115.2022.9734694","url":null,"abstract":"In order to improve the working efficiency and safety of the stainless steel spoon punching, after analyzing the punching and cutting process and the production requirements of enterprise, a precision positioning control system for the automatic feeding device based on integral separation PID algorithm is designed. The system uses Siemens S7-200SMART PLC as the master station. Design parameters and display data through the touch screen, and use DC motors and pneumatic circuits to achieve coordinated control of the punch and feeder. Through actual production verification, the system has high relocation accuracy and reliable operation, the efficiency increased by 40%. At the same time, it reduces safety hazards and labor costs, provides a reference and theoretical basis for the automation upgrade and transformation of stamping feeding.","PeriodicalId":127300,"journal":{"name":"2022 IEEE 6th Information Technology and Mechatronics Engineering Conference (ITOEC)","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123242495","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design and Control Method of Power Conversion System for Emergency Power Supply 应急电源转换系统的设计与控制方法
2022 IEEE 6th Information Technology and Mechatronics Engineering Conference (ITOEC) Pub Date : 2022-03-04 DOI: 10.1109/ITOEC53115.2022.9734491
Jinyu Chen, Zhicheng Li, Yuanliang Fan, Chao Li
{"title":"Design and Control Method of Power Conversion System for Emergency Power Supply","authors":"Jinyu Chen, Zhicheng Li, Yuanliang Fan, Chao Li","doi":"10.1109/ITOEC53115.2022.9734491","DOIUrl":"https://doi.org/10.1109/ITOEC53115.2022.9734491","url":null,"abstract":"Power conversion system is the key equipment to realize two-way energy transfer between energy storage battery and AC power grid. This paper introduces a design and control method of power conversion system for emergency power supply. The power conversion system can select grid connected operation or independent on load operation to meet the multi scenario application requirements of emergency power supply site. During grid connected operation, the input power is controlled by controlling the input current, and then the output voltage at the DC side is controlled. During independent load operation, the load voltage and frequency are controlled by controlling the output voltage amplitude and frequency of the converter. The proposed constant voltage current limiting control strategy can maintain the DC bus voltage near the reference value and improve the reliability of battery charge and discharge.","PeriodicalId":127300,"journal":{"name":"2022 IEEE 6th Information Technology and Mechatronics Engineering Conference (ITOEC)","volume":"90 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123270870","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on Information Security Protection of Industrial Internet Oriented CNC System 面向工业互联网的数控系统信息安全保护研究
2022 IEEE 6th Information Technology and Mechatronics Engineering Conference (ITOEC) Pub Date : 2022-03-04 DOI: 10.1109/ITOEC53115.2022.9734588
Xuehong Chen, Zi Wang, Shuaifeng Yang
{"title":"Research on Information Security Protection of Industrial Internet Oriented CNC System","authors":"Xuehong Chen, Zi Wang, Shuaifeng Yang","doi":"10.1109/ITOEC53115.2022.9734588","DOIUrl":"https://doi.org/10.1109/ITOEC53115.2022.9734588","url":null,"abstract":"Machine tool is known as the mother of industry. CNC machine tool is the embodiment of modern automatic control productivity. In the context of the rapid development of the industrial Internet, a large number of equipment and systems are interconnected through the industrial Internet, realizing the flexible adaptation from the supply side to the demand side. As the a typical core system of industrial Internet, CNC system is facing the threat of industrial virus and network attack. The problem of information security is becoming more and more prominent. This paper analyzes the security risks of the existing CNC system from the aspects of terminal security, data security and network security. By comprehensively using the technologies of data encryption, identity authentication, digital signature, access control, secure communication and key management, this paper puts forward a targeted security protection and management scheme, which effectively strengthens the overall security protection ability.","PeriodicalId":127300,"journal":{"name":"2022 IEEE 6th Information Technology and Mechatronics Engineering Conference (ITOEC)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123426654","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Method for intelligently identifying underground safety accidents based on fully connected neural network 基于全连接神经网络的井下安全事故智能识别方法
2022 IEEE 6th Information Technology and Mechatronics Engineering Conference (ITOEC) Pub Date : 2022-03-04 DOI: 10.1109/ITOEC53115.2022.9734567
Huimiao Yuan, H. Hao, Yu Zhang, Yuanyuan Zhao, Yu Chen
{"title":"Method for intelligently identifying underground safety accidents based on fully connected neural network","authors":"Huimiao Yuan, H. Hao, Yu Zhang, Yuanyuan Zhao, Yu Chen","doi":"10.1109/ITOEC53115.2022.9734567","DOIUrl":"https://doi.org/10.1109/ITOEC53115.2022.9734567","url":null,"abstract":"Coal mine production is generally a multi-step and multi-step process of underground mining. The geology and mining conditions are complex, and there are many uneasy factors. They are often affected by gas, water and fire, carbon monoxide, ventilation, temperature, and roofs. Therefore, only by putting coal mine safety first in the work can keep the safety of underground workers and the normal progress of coal mine production work be ensured. Nowadays, predicting the cause of the alarm is the primary task of coal production. Moreover, many coal mining industries still remain at the manual recording stage for the cause of the alarm. Most of them rely on staff to manually record underground and then enter the system for storage. This makes it impossible to obtain timely feedback processing and statistics on hidden dangers. Moreover, underground work also includes a lot of sensor alarms caused by normal work, such as blasting, calibration and maintenance of circuits and other reasons, so it also caused a waste of time. Not only that, in the history of coal mining, it has been found that most of the casualties were caused by the “three violations”. In short, it was man-made. In order to avoid these errors and reduce the phenomenon of “three violations”, it is necessary to strengthen the protection of the mining personnel. Compliance inspections and one's own safety awareness can fundamentally reduce the occurrence of casualties.","PeriodicalId":127300,"journal":{"name":"2022 IEEE 6th Information Technology and Mechatronics Engineering Conference (ITOEC)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123555608","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Semantic Augmentation Transformer Model for Ad-hoc Retrieval 面向自组织检索的语义增强转换模型
2022 IEEE 6th Information Technology and Mechatronics Engineering Conference (ITOEC) Pub Date : 2022-03-04 DOI: 10.1109/ITOEC53115.2022.9734522
Chongyang Li
{"title":"Semantic Augmentation Transformer Model for Ad-hoc Retrieval","authors":"Chongyang Li","doi":"10.1109/ITOEC53115.2022.9734522","DOIUrl":"https://doi.org/10.1109/ITOEC53115.2022.9734522","url":null,"abstract":"We propose SATM, a Semantic Augmentation Transformer Model for ad-hoc retrieval. SATM adapts contrastive learning, which improves the performance of semantic similarity and the ranking results of ad-hoc retrieval. It can also augment the semantic representation of sentence embeddings. Specifically, we first use an unsup-ervised contrastive learning augmentation module to learn query similarity so that the projection head can accurately capture query semantics. Then we use the trained encoder network to map queries and perform semantic similarity calculations and rankings with document embeddings. We use BERT to extract the contextual representation of the sentence, and use the augmentation module to enhance the semantics and eliminate the anisotropy of sentence embedding. Experimental results show that in the TrecQA data set, SATM has 4% and 1.4% improvements in MRR and MAP over Bert-base.","PeriodicalId":127300,"journal":{"name":"2022 IEEE 6th Information Technology and Mechatronics Engineering Conference (ITOEC)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115200121","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信