Bo Li, Hongyu Zhang, Jian Xiao, Shanli Zhong, Lei Wu, Xudong Wei
{"title":"Energy-Efficient Multi-agent Cooperative Search Control Based on Deep Reinforcement Learning on Uneven Terrains","authors":"Bo Li, Hongyu Zhang, Jian Xiao, Shanli Zhong, Lei Wu, Xudong Wei","doi":"10.1109/ITOEC53115.2022.9734558","DOIUrl":"https://doi.org/10.1109/ITOEC53115.2022.9734558","url":null,"abstract":"Anti-flocking algorithm for multi-agent to search a given area of interest(AOI) has been relatively mature. Multi-agent is basically used to search for uneven terrain, but the most existing anti-flocking algorithms are designed for flat terrain, so agents often use the shortest path to move between navigation targets. Using the shortest path to move in uneven terrain will consume more energy. At present, agents basically use portable energy to provide power, so we should try to reduce energy consumption. This brief proposes an energy-efficient multi-agent cooperative search control based on deep reinforcement learning on uneven terrains. The proposed algorithm selects the navigation target points through deep reinforcement learning, and encourages the agent to move between the navigation target points along the contour line. Simulation results show that the proposed control protocol is a promising energy-efficient solution for multi-agent operating on uneven terrains.","PeriodicalId":127300,"journal":{"name":"2022 IEEE 6th Information Technology and Mechatronics Engineering Conference (ITOEC)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115230121","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on Reactive Power Optimization of Distribution Network with Distributed Generation","authors":"Xiaomeng Wu, Fengyu Sun, Weidong Tian","doi":"10.1109/ITOEC53115.2022.9734541","DOIUrl":"https://doi.org/10.1109/ITOEC53115.2022.9734541","url":null,"abstract":"Due to its good environmental, social and economic benefits, the combination of distributed generation and centralized power generation has been the trend of power system development, but the randomness and intermittency of distributed generation have brought new problems to the system. For the reactive power optimization problem of distribution network with distributed generation, this study establishes a reactive power optimization model with the minimum active loss, the minimum voltage offset and the minimum average voltage offset as the multi-objectives. Different from most studies using weight to convert multi-objective into single-objective, this paper uses the multi-objective model of Pareto optimal solution, uses the improved non-dominated sorting differential evolution algorithm to determine the capacity of distributed generation, obtains a set of Pareto optimal solutions, and selects the compromise solution. Finally, taking IEEE33 - bus system as an example, the proposed model and algorithm are verified. The results show that the model and algorithm have certain reference value for reactive power optimization of distribution network.","PeriodicalId":127300,"journal":{"name":"2022 IEEE 6th Information Technology and Mechatronics Engineering Conference (ITOEC)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115311064","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Copy-Move Forgery Detection Algorithm based on Feature Point Clustering","authors":"Jiming Zheng, Kailang Zhang","doi":"10.1109/ITOEC53115.2022.9734556","DOIUrl":"https://doi.org/10.1109/ITOEC53115.2022.9734556","url":null,"abstract":"Aiming at the high time complexity of the feature matching stage of the current copy-move forgery detection algorithm, an image copy-move forgery detection algorithm using structure tensor and HSV color model to cluster feature points is proposed. First, cluster the SIFT feature points based on the structure tensor, and divide all feature points into flat feature points, edge feature points, and corner feature points, which are divided into 3 clusters; Then, based on the clustering method of HSV color model, the feature points are divided into 63 clusters. Finally, feature matching is carried out in each cluster, which makes full use of the similarity of texture and color between the source region and the tampered region, effectively reduces the time of feature matching and improves the efficiency of the algorithm. Experimental results show that the proposed algorithm can effectively detect tampered areas, has a greater advantage in matching time, and has good robustness.","PeriodicalId":127300,"journal":{"name":"2022 IEEE 6th Information Technology and Mechatronics Engineering Conference (ITOEC)","volume":"2014 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127444189","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design on One-cycle Control VIENNA Rectifier Based on FPGA","authors":"Gang Liu, Liyun Pan, Qiangang Sun","doi":"10.1109/ITOEC53115.2022.9734333","DOIUrl":"https://doi.org/10.1109/ITOEC53115.2022.9734333","url":null,"abstract":"A realization scheme for the VIENNA rectifier based on Field Programmable Gate Array (FPGA) is proposed. Furthermore, the experimental platform is built by innovative using of FPGA to realize one-cycle control strategy. This method has more advantages such as high integration and high power density compared with discrete circuit. Meanwhile the synchronization of three-phase driving pulses based on FPGA parallel processing is superior to serial working mode.","PeriodicalId":127300,"journal":{"name":"2022 IEEE 6th Information Technology and Mechatronics Engineering Conference (ITOEC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124883551","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"PSO-SVM-based method for predicting the demand for airline material carriage","authors":"Ming Hao, Yun Wang, Xianfeng Zu","doi":"10.1109/ITOEC53115.2022.9734698","DOIUrl":"https://doi.org/10.1109/ITOEC53115.2022.9734698","url":null,"abstract":"As an important military aircraft material, with the increase in the number of off-site flight missions, it is inevitable to transfer to other sites for carrying security. With the increase of joint exercises, target training and other missions, the mission environment is complex and changeable, which puts forward higher requirements on the level of carry guarantee, among which the accurate prediction of the demand for aviation materials in the mission is one of the main elements of good carry guarantee. In this paper, we propose to use Support Vector Machine (SVM) to predict the number of aircraft materials to be carried, and apply the Particle Swarm Algorithm (PSO) to optimize the SVM parameters. By simulating and comparing PSO-SVM, GS-SVM and GA-SVM, the PSO-SVM algorithm is able to predict the airline material carrying requirements more accurately in a shorter period of time.","PeriodicalId":127300,"journal":{"name":"2022 IEEE 6th Information Technology and Mechatronics Engineering Conference (ITOEC)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125957996","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on Precision Positioning Control System of Punching Machine Feeding Device","authors":"Dang-feng Pang, Shigang Cui, Yongli Zhang","doi":"10.1109/ITOEC53115.2022.9734694","DOIUrl":"https://doi.org/10.1109/ITOEC53115.2022.9734694","url":null,"abstract":"In order to improve the working efficiency and safety of the stainless steel spoon punching, after analyzing the punching and cutting process and the production requirements of enterprise, a precision positioning control system for the automatic feeding device based on integral separation PID algorithm is designed. The system uses Siemens S7-200SMART PLC as the master station. Design parameters and display data through the touch screen, and use DC motors and pneumatic circuits to achieve coordinated control of the punch and feeder. Through actual production verification, the system has high relocation accuracy and reliable operation, the efficiency increased by 40%. At the same time, it reduces safety hazards and labor costs, provides a reference and theoretical basis for the automation upgrade and transformation of stamping feeding.","PeriodicalId":127300,"journal":{"name":"2022 IEEE 6th Information Technology and Mechatronics Engineering Conference (ITOEC)","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123242495","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design and Control Method of Power Conversion System for Emergency Power Supply","authors":"Jinyu Chen, Zhicheng Li, Yuanliang Fan, Chao Li","doi":"10.1109/ITOEC53115.2022.9734491","DOIUrl":"https://doi.org/10.1109/ITOEC53115.2022.9734491","url":null,"abstract":"Power conversion system is the key equipment to realize two-way energy transfer between energy storage battery and AC power grid. This paper introduces a design and control method of power conversion system for emergency power supply. The power conversion system can select grid connected operation or independent on load operation to meet the multi scenario application requirements of emergency power supply site. During grid connected operation, the input power is controlled by controlling the input current, and then the output voltage at the DC side is controlled. During independent load operation, the load voltage and frequency are controlled by controlling the output voltage amplitude and frequency of the converter. The proposed constant voltage current limiting control strategy can maintain the DC bus voltage near the reference value and improve the reliability of battery charge and discharge.","PeriodicalId":127300,"journal":{"name":"2022 IEEE 6th Information Technology and Mechatronics Engineering Conference (ITOEC)","volume":"90 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123270870","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on Information Security Protection of Industrial Internet Oriented CNC System","authors":"Xuehong Chen, Zi Wang, Shuaifeng Yang","doi":"10.1109/ITOEC53115.2022.9734588","DOIUrl":"https://doi.org/10.1109/ITOEC53115.2022.9734588","url":null,"abstract":"Machine tool is known as the mother of industry. CNC machine tool is the embodiment of modern automatic control productivity. In the context of the rapid development of the industrial Internet, a large number of equipment and systems are interconnected through the industrial Internet, realizing the flexible adaptation from the supply side to the demand side. As the a typical core system of industrial Internet, CNC system is facing the threat of industrial virus and network attack. The problem of information security is becoming more and more prominent. This paper analyzes the security risks of the existing CNC system from the aspects of terminal security, data security and network security. By comprehensively using the technologies of data encryption, identity authentication, digital signature, access control, secure communication and key management, this paper puts forward a targeted security protection and management scheme, which effectively strengthens the overall security protection ability.","PeriodicalId":127300,"journal":{"name":"2022 IEEE 6th Information Technology and Mechatronics Engineering Conference (ITOEC)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123426654","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Huimiao Yuan, H. Hao, Yu Zhang, Yuanyuan Zhao, Yu Chen
{"title":"Method for intelligently identifying underground safety accidents based on fully connected neural network","authors":"Huimiao Yuan, H. Hao, Yu Zhang, Yuanyuan Zhao, Yu Chen","doi":"10.1109/ITOEC53115.2022.9734567","DOIUrl":"https://doi.org/10.1109/ITOEC53115.2022.9734567","url":null,"abstract":"Coal mine production is generally a multi-step and multi-step process of underground mining. The geology and mining conditions are complex, and there are many uneasy factors. They are often affected by gas, water and fire, carbon monoxide, ventilation, temperature, and roofs. Therefore, only by putting coal mine safety first in the work can keep the safety of underground workers and the normal progress of coal mine production work be ensured. Nowadays, predicting the cause of the alarm is the primary task of coal production. Moreover, many coal mining industries still remain at the manual recording stage for the cause of the alarm. Most of them rely on staff to manually record underground and then enter the system for storage. This makes it impossible to obtain timely feedback processing and statistics on hidden dangers. Moreover, underground work also includes a lot of sensor alarms caused by normal work, such as blasting, calibration and maintenance of circuits and other reasons, so it also caused a waste of time. Not only that, in the history of coal mining, it has been found that most of the casualties were caused by the “three violations”. In short, it was man-made. In order to avoid these errors and reduce the phenomenon of “three violations”, it is necessary to strengthen the protection of the mining personnel. Compliance inspections and one's own safety awareness can fundamentally reduce the occurrence of casualties.","PeriodicalId":127300,"journal":{"name":"2022 IEEE 6th Information Technology and Mechatronics Engineering Conference (ITOEC)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123555608","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Semantic Augmentation Transformer Model for Ad-hoc Retrieval","authors":"Chongyang Li","doi":"10.1109/ITOEC53115.2022.9734522","DOIUrl":"https://doi.org/10.1109/ITOEC53115.2022.9734522","url":null,"abstract":"We propose SATM, a Semantic Augmentation Transformer Model for ad-hoc retrieval. SATM adapts contrastive learning, which improves the performance of semantic similarity and the ranking results of ad-hoc retrieval. It can also augment the semantic representation of sentence embeddings. Specifically, we first use an unsup-ervised contrastive learning augmentation module to learn query similarity so that the projection head can accurately capture query semantics. Then we use the trained encoder network to map queries and perform semantic similarity calculations and rankings with document embeddings. We use BERT to extract the contextual representation of the sentence, and use the augmentation module to enhance the semantics and eliminate the anisotropy of sentence embedding. Experimental results show that in the TrecQA data set, SATM has 4% and 1.4% improvements in MRR and MAP over Bert-base.","PeriodicalId":127300,"journal":{"name":"2022 IEEE 6th Information Technology and Mechatronics Engineering Conference (ITOEC)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115200121","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}