2022 IEEE 5th International Conference on Electronics Technology (ICET)最新文献

筛选
英文 中文
Renewable Energy Capacity Credit Assessment Method Considering Source-load Correlation 考虑源负荷相关性的可再生能源容量信用评估方法
2022 IEEE 5th International Conference on Electronics Technology (ICET) Pub Date : 2022-05-13 DOI: 10.1109/icet55676.2022.9825300
Y. Mi, Yongji Cao, Hengxu Zhang, Jinye Yang, Chen Li, Leshu Sun
{"title":"Renewable Energy Capacity Credit Assessment Method Considering Source-load Correlation","authors":"Y. Mi, Yongji Cao, Hengxu Zhang, Jinye Yang, Chen Li, Leshu Sun","doi":"10.1109/icet55676.2022.9825300","DOIUrl":"https://doi.org/10.1109/icet55676.2022.9825300","url":null,"abstract":"The capacity credit is an important index to measure the contribution of renewable energy to the power system. Considering the source-load correlation, a capacity credit assessment method is proposed in this paper. The Copula function is used to describe the correlation between renewable energy and load in seasonal scenarios, and a source-load joint probability distribution model is constructed to generate source-load correlation scenarios. Based on the source-load correlation scenarios, the assessment of capacity credit is performed from the perspective of source-load matching. Finally, the capacity credit assessment is carried out through a case study, and the result verifies the effectiveness of the proposed method.","PeriodicalId":166358,"journal":{"name":"2022 IEEE 5th International Conference on Electronics Technology (ICET)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121179510","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Resistive Switching in Sputtered ZnO/IGZO Heterostructure Memristor 溅射ZnO/IGZO异质结构忆阻器的电阻开关
2022 IEEE 5th International Conference on Electronics Technology (ICET) Pub Date : 2022-05-13 DOI: 10.1109/icet55676.2022.9824179
Xiongfeng Wang, W. Liao, T. Rao, Yuanliang Zhou, Yuankang Chen, Yudong Pang, Xiaopei Chen, Guocheng Bao
{"title":"Resistive Switching in Sputtered ZnO/IGZO Heterostructure Memristor","authors":"Xiongfeng Wang, W. Liao, T. Rao, Yuanliang Zhou, Yuankang Chen, Yudong Pang, Xiaopei Chen, Guocheng Bao","doi":"10.1109/icet55676.2022.9824179","DOIUrl":"https://doi.org/10.1109/icet55676.2022.9824179","url":null,"abstract":"Owing to the reversible resistive switching behavior, memristor possesses great potential in non-volatile memory application. In this work, we proposed a ZnO/IGZO heterostructure based memristor, which shows a typical bipolar resistive switching behavior under different compliance current and a high HRS/LRS ratio of 108, rendering it suitable for nonvolatile memory. Space-Charge-Limited Conduction (SCLC) mechanism is found suitable for understanding the current conduction while the diffusion of oxygen vacancies between the two dielectric layers leads to the resistive switching behavior.","PeriodicalId":166358,"journal":{"name":"2022 IEEE 5th International Conference on Electronics Technology (ICET)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121597980","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Novel Meshless Element Method for Elliptic Equation 一种新的椭圆方程无网格元法
2022 IEEE 5th International Conference on Electronics Technology (ICET) Pub Date : 2022-05-13 DOI: 10.1109/icet55676.2022.9824816
Xiaosong Zhu, Xuanhong Liang, Yunhao Qiu, Youyuan Wang
{"title":"A Novel Meshless Element Method for Elliptic Equation","authors":"Xiaosong Zhu, Xuanhong Liang, Yunhao Qiu, Youyuan Wang","doi":"10.1109/icet55676.2022.9824816","DOIUrl":"https://doi.org/10.1109/icet55676.2022.9824816","url":null,"abstract":"Meshless method based on strong form has the advantages of high computational speed and convenient application, but it suffers low accuracy and instability. In this paper, we propose a meshless virtual element method (VEM) based on strong-form to promote accuracy and instability. Virtual element is built around each node for establishing local function, which used to calculate the derivative of shape function. The optimal selection of point-cloud with adaptive algorithm is proposed to balance the stability and accuracy of interpolation. Numerical simulation demonstrates that VEM has improvement in stability compared with other conventional strong-form method, just needing additional small calculation. and surpass finite element method (FEM) in accuracy and the ability for catching high gradient change.","PeriodicalId":166358,"journal":{"name":"2022 IEEE 5th International Conference on Electronics Technology (ICET)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125350670","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on the Evalution Method of Surface Warship Low Levels Maintenance Time 水面舰艇低空维修时间评估方法研究
2022 IEEE 5th International Conference on Electronics Technology (ICET) Pub Date : 2022-05-13 DOI: 10.1109/icet55676.2022.9824821
Xiaobai Liu, Bo Wang, Hongxin Cui
{"title":"Research on the Evalution Method of Surface Warship Low Levels Maintenance Time","authors":"Xiaobai Liu, Bo Wang, Hongxin Cui","doi":"10.1109/icet55676.2022.9824821","DOIUrl":"https://doi.org/10.1109/icet55676.2022.9824821","url":null,"abstract":"The in-shipyard maintenance time of warship has an important influence on its navigation rate, service life and repair engineering profit during its whole life cycle. On the basis of combing and analyzing the engineering practice of warship’s levels maintenance at home and abroad, a method for in-shipyard maintenance time evaluating based on the key repair path was put forward in this paper, as which divided the surface warship low levels maintenance into 9 engineering stages from the time sequence relationship. At the same time, the levels maintenance time evaluation model and the basic maintenance time database of the surface warships were established basing above. The correctness of this evaluation method was verified by comparing the maintenance time evaluation results with the real maintenance data, which could provide an important technical basis for the weapon management department to make use and maintenance decisions.","PeriodicalId":166358,"journal":{"name":"2022 IEEE 5th International Conference on Electronics Technology (ICET)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122168612","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IoT Warehouse Management System Based on ACO Path Planning 基于蚁群算法路径规划的物联网仓库管理系统
2022 IEEE 5th International Conference on Electronics Technology (ICET) Pub Date : 2022-05-13 DOI: 10.1109/icet55676.2022.9824705
Fucheng Men, Junmei Guo, Yizhong Luan
{"title":"IoT Warehouse Management System Based on ACO Path Planning","authors":"Fucheng Men, Junmei Guo, Yizhong Luan","doi":"10.1109/icet55676.2022.9824705","DOIUrl":"https://doi.org/10.1109/icet55676.2022.9824705","url":null,"abstract":"Current storage management processes involving storage equipment suffer from Automated Guided Vehicle (AGV) path planning problems and rely on recording cargo and information manually. Hence, storage facilities present a low equipment operation efficiency due to recording errors and preserving storage data in paper, which is easy to lose. Therefore, this paper develops an Ant Colony Optimization (ACO) path planning-based IoT warehouse management system, relying on an ant colony algorithm and IoT technology. The proposed system collects and processes the forklift’s data through the vehicle’s intelligent terminal and exploits an optimized ant colony algorithm to realize the forklift’s real-time positioning, over-speed alarm, and path planning. Data transmission between the vehicle terminal and the warehouse management platform is established through the MQTT protocol. Finally, the entire system is monitored and managed through a WEB browser, with the MySQL database employed for persistent data storage. Adopting the developed non-contact warehouse management method centralizes and networks the scattered data in the warehouse management process, improving warehouse logistics efficiency.","PeriodicalId":166358,"journal":{"name":"2022 IEEE 5th International Conference on Electronics Technology (ICET)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122526454","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Research on Fire Escape System Based on Virtual Reality Technology 基于虚拟现实技术的火灾逃生系统研究
2022 IEEE 5th International Conference on Electronics Technology (ICET) Pub Date : 2022-05-13 DOI: 10.1109/icet55676.2022.9824639
Chuanjie Lei, Siyue Ke, Zhangfei Pei, Wenbo Shao, Shanshan Liu, Yan Wang
{"title":"Research on Fire Escape System Based on Virtual Reality Technology","authors":"Chuanjie Lei, Siyue Ke, Zhangfei Pei, Wenbo Shao, Shanshan Liu, Yan Wang","doi":"10.1109/icet55676.2022.9824639","DOIUrl":"https://doi.org/10.1109/icet55676.2022.9824639","url":null,"abstract":"Virtual reality technology mainly provides participants with a realistic simulation experience by using computer simulation systems to simulate the external environment. The fire escape system based on virtual reality technology has the characteristics of immersion, interactivity, conceivability, and 3D visualization, which is conducive to improving the fire safety awareness of the experiencer and enhancing the authenticity of fire drills. This paper first introduced the background of the fire escape system, analyzed the characteristics of the fire escape system technology, focusing on particle collision and sensory impact, and the application of relevant technologies to virtual reality technology applied to the anti-escape system, through scene restoration, scenario reproduction and other ways to be able to optimize the firefighting and rescue disposal tactical program, to achieve the interactive function with the virtual scene, to provide a scientific plan to deal with similar cases in the future. Finally, a comparison is made between the conventional fire escape training method and the method proposed in this paper. The method proposed in this paper is more favorable to enhance the authenticity and experience of the fire escape system for the experiencer.","PeriodicalId":166358,"journal":{"name":"2022 IEEE 5th International Conference on Electronics Technology (ICET)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127926592","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Rating the Severity of Toxic Comments Using BERT-Based Deep Learning Method 使用基于bert的深度学习方法对有毒评论的严重程度进行评级
2022 IEEE 5th International Conference on Electronics Technology (ICET) Pub Date : 2022-05-13 DOI: 10.1109/icet55676.2022.9825384
Ziyu Zhai
{"title":"Rating the Severity of Toxic Comments Using BERT-Based Deep Learning Method","authors":"Ziyu Zhai","doi":"10.1109/icet55676.2022.9825384","DOIUrl":"https://doi.org/10.1109/icet55676.2022.9825384","url":null,"abstract":"With the integration of Internet and smartphones into people’s lives, toxic comments become ubiquitous on various online social media. These comments hinder seriously the construction of a safe and healthy network environment, leading to a great demand for automated methods which can effectively identify such harmful information and deal with it in a timely manner. To address this challenge, we propose a BERT-based deep learning method in this paper to rate the severity of toxic comments. On the basis of the text dataset provided by Jigsaw, BERT-based backbones (RoBERTa and DeBERTa) are trained to extract contextualized embeddings from sentences. After that, corresponding severity scores of comments are calculated by the subsequent head layers, where the head is chosen from the multilayer perceptron, convolutional neural network, and attention structure. After applying the K-Fold cross validation and an average ensemble of different models, our method achieves a rank 28/2301 (top 1.2%) in the leaderboard of Jigsaw Rate Severity of Toxic Comments Kaggle competition. This result can get a silver medal in this competition, and proves that our model can be an effective approach to rate precisely the severity of a toxic comment. This work can remarkably reduce the workload of manual review of Internet content and help build a more harmonious online community environment.","PeriodicalId":166358,"journal":{"name":"2022 IEEE 5th International Conference on Electronics Technology (ICET)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131133265","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Research on Bearing Digital Twin Modeling and Residual Life Predictive Simulation Based on Deep Learning 基于深度学习的轴承数字孪生建模及剩余寿命预测仿真研究
2022 IEEE 5th International Conference on Electronics Technology (ICET) Pub Date : 2022-05-13 DOI: 10.1109/icet55676.2022.9824825
Jieting Huang, Tan Li, Weining Song, Zhiming Zheng
{"title":"Research on Bearing Digital Twin Modeling and Residual Life Predictive Simulation Based on Deep Learning","authors":"Jieting Huang, Tan Li, Weining Song, Zhiming Zheng","doi":"10.1109/icet55676.2022.9824825","DOIUrl":"https://doi.org/10.1109/icet55676.2022.9824825","url":null,"abstract":"Modern Digital Twin models are normally built based on massive live data from the manufacturing life-cycle to realize the real-time virtual representation of the physical system and applied in predictive simulation for optimization suggestions and fault warnings for the subsequent operation. Four residual life prediction methods based on deep learning are established to build Bearing Digital Twin models, including the classical CNN and RNN, as well as the LSTM and CNN-LSTM. The real rolling bearing digital twin models are setup and predictive simulated based on the given datasets and evaluation indicators. The simulation results are analyzed and the best performance models for Bearing residual life prediction are stated as a conclusion. Some future research points on deep learning based digital twin modeling and simulation are proposed.","PeriodicalId":166358,"journal":{"name":"2022 IEEE 5th International Conference on Electronics Technology (ICET)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130030635","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Implement Security Analysis of Access Control Policy Based on Constraint by SMT 利用SMT实现基于约束的访问控制策略安全性分析
2022 IEEE 5th International Conference on Electronics Technology (ICET) Pub Date : 2022-05-13 DOI: 10.1109/icet55676.2022.9824517
Aodi Liu, Xuehui Du, Nan Wang, Xiaochang Wang, Xiangyu Wu, Jiashun Zhou
{"title":"Implement Security Analysis of Access Control Policy Based on Constraint by SMT","authors":"Aodi Liu, Xuehui Du, Nan Wang, Xiaochang Wang, Xiangyu Wu, Jiashun Zhou","doi":"10.1109/icet55676.2022.9824517","DOIUrl":"https://doi.org/10.1109/icet55676.2022.9824517","url":null,"abstract":"Access control is a widely used technology to protect information security. The implementation of access control depends on the response generated by access control policies to users’ access requests. Therefore, ensuring the correctness of access control policies is an important step to ensure the smooth implementation of access control mechanisms. To solve this problem, this paper proposes a constraint based access control policy security analysis framework (CACPSAF) to perform security analysis on access control policies. The framework transforms the problem of security analysis of access control policy into the satisfiability of security principle constraints. The analysis and calculation of access control policy can be divided into formal transformation of access control policy, SMT coding of policy model, generation of security principle constraints, policy detection and evaluation. The security analysis of policies is divided into mandatory security principle constraints, optional security principle constraints and user-defined security principle constraints. The multi-dimensional security analysis of access control policies is realized and the semantic expression of policy analysis is stronger. Finally, the effectiveness of this framework is analyzed by performance evaluation, which proves that this framework can provide strong support for fine-grained security analysis of policies, and help to correctly model and conFigure policies during policy modeling, implementation and verification.","PeriodicalId":166358,"journal":{"name":"2022 IEEE 5th International Conference on Electronics Technology (ICET)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124910423","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Grey Wolf optimizer-Based Topology Shaping Method for UAV Swarm 一种基于灰狼优化器的无人机群拓扑整形方法
2022 IEEE 5th International Conference on Electronics Technology (ICET) Pub Date : 2022-05-13 DOI: 10.1109/icet55676.2022.9824250
Yanxiang Yang, Xiangyin Zhang, Bo Li, Kaiyu Qin
{"title":"A Grey Wolf optimizer-Based Topology Shaping Method for UAV Swarm","authors":"Yanxiang Yang, Xiangyin Zhang, Bo Li, Kaiyu Qin","doi":"10.1109/icet55676.2022.9824250","DOIUrl":"https://doi.org/10.1109/icet55676.2022.9824250","url":null,"abstract":"Topology shaping is crucial for UAV swarms applications. The optimization of topology shaping generally involves two aspects, i.e. the determination of optimal mapping relationship from the initial topology to the target topology and the optimization of topology shaping position, which are both directly related to the global energy consumption of the UAV swarm. Therefore, joint optimization of the mapping relationship and the topology shaping position is necessary to be performed in the topology shaping process of the UAV swarm. In this paper, a joint optimization model of topology shaping is proposed and the Grey Wolf optimizer algorithm is employed to solve the model. Simulation results show that the proposed method can achieve topology shaping and exhibits better convergence of the algorithm while maintaining the same minimum global energy consumption.","PeriodicalId":166358,"journal":{"name":"2022 IEEE 5th International Conference on Electronics Technology (ICET)","volume":"616 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127525475","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信