Yewen Wei, Shuailong Dai, Jialin Yu, Shuo Wu, Jiayu Wang
{"title":"Research on Status and Prospects of Battery Energy Storage Stations on Energy Internet","authors":"Yewen Wei, Shuailong Dai, Jialin Yu, Shuo Wu, Jiayu Wang","doi":"10.1109/ITNEC.2019.8729063","DOIUrl":"https://doi.org/10.1109/ITNEC.2019.8729063","url":null,"abstract":"The application of the fourth industrial revolution has become an opportunity and objective condition for realizing the energy Internet, in which energy storage technology is the cornerstone. However, the research on energy storage technology often stays in the aspects of power grid cutting and valley filling, improving power quality, etc., and the research on the working mechanism and control methods in the energy Internet and future development is still scarce. Starting from the current situation of battery energy storage in the energy Internet, this paper first introduces the differences of nature between the batteries and the characteristics of energy storage power stations at home and abroad. Then several key technologies of the battery energy storage system are explained. Finally, the technical bottleneck and development prospects of battery energy storage in the energy Internet environment are prospected.","PeriodicalId":202966,"journal":{"name":"2019 IEEE 3rd Information Technology, Networking, Electronic and Automation Control Conference (ITNEC)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116983276","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Optimal Path Selection for Fault Repair Based on Grid GIS Platform and Improved Fireworks Algorithm","authors":"Zheng Qian, Changhua Hu","doi":"10.1109/ITNEC.2019.8729359","DOIUrl":"https://doi.org/10.1109/ITNEC.2019.8729359","url":null,"abstract":"How to quickly determine the best repair path is of great significance for ensuring the reliability of power supply. In this paper, the GIS platform with multi-system data is built, and the mathematical model of optimal path selection for fault repair is constructed by using the weighted vector diagram of the platform. A new intelligent algorithm, fireworks algorithm, is introduced in this paper, aiming at the determination of unstable initialization of the algorithm, reverse initialization is proposed, and the elite selection is used to improve the convergence rate in the process of global optimization. In view of the local optimal determination in the late stage of the algorithm, The chaos operator is introduced to ensure the diversity of the algorithm and improve the accuracy of the algorithm. Finally, the improved fireworks algorithm is used to solve the optimal path mathematical model. The simulation results show that the optimal path selection of fault repair based on GIS platform and improved fireworks algorithm is more accurate and faster than particle swarm optimization algorithm.","PeriodicalId":202966,"journal":{"name":"2019 IEEE 3rd Information Technology, Networking, Electronic and Automation Control Conference (ITNEC)","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115084513","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Liang Li, Qian‐qian Zhang, Gongmei Qi, Kai Zhang, Minqiang Li, Daoyang Yu, Jinhuai Liu
{"title":"Algorithm of Obstacle Avoidance for Autonomous Surface Vehicles based on LIDAR Detection","authors":"Liang Li, Qian‐qian Zhang, Gongmei Qi, Kai Zhang, Minqiang Li, Daoyang Yu, Jinhuai Liu","doi":"10.1109/ITNEC.2019.8729203","DOIUrl":"https://doi.org/10.1109/ITNEC.2019.8729203","url":null,"abstract":"This paper mainly introduces the algorithm of avoiding obstacles based on the detection of LIDAR and gives the results of simulation under environment of MATLAB. The image acquisition system based on laser radar can provide real-time location information to meet the requirements of image acquisition and processing of system. The VFH+ algorithm is used to update angle and speed of the ASV. A method of rapid expansion, corrosion processing of binary image and device were used for the process of laser image processing. Binary image has features of simple, less-space et al., so efficiency of image processing is improved by dealing with multiple pixels at one time. The innovative point of the laser image processing technology is combined with the classical algorithm VFH+ of avoiding obstacle to realize the autonomous navigation system of ASV. The proposed ASV algorithm of avoiding obstacle based on LIDAR detection is applied to the ASV, which has great value of research and application. For example, it was used for ASV with wind and water complementary, water quality monitoring and sampling, and cleaning up the surface of oil pollution.","PeriodicalId":202966,"journal":{"name":"2019 IEEE 3rd Information Technology, Networking, Electronic and Automation Control Conference (ITNEC)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122501445","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Deep Learning Based Attack On Social Authentication System","authors":"Wei Zhou, Xiao-Fang Yuan, Wenjun Chai, Hui Ma","doi":"10.1109/ITNEC.2019.8729194","DOIUrl":"https://doi.org/10.1109/ITNEC.2019.8729194","url":null,"abstract":"As the rapid development of the Internet, social networks sites, such as Twitter and Facebook, are become more and more popular. These sites require users to provide various kinds of personal data to personalize their services. However, unintentionally disclosed personal information utilized by hackers may pose many security problems. In this paper, we present a deep learning based attack on the social authentication in the Facebook site. Social authentication, known as the fourth-factor authentication, utilizes social interaction information to achieve the identification of users. In the process of account recovery and remote login, the social authentication which requires users to identify names of friends displayed in photos is used as a part of the authentication module. After collecting public information of friends’ photos through web crawler, the attach system uses deep learning networks based on face_recognition library and convolutional neural network (CNN for short) to train the model. The attack is achieved through the successful identification of friends’ names using the trained deep learning model.","PeriodicalId":202966,"journal":{"name":"2019 IEEE 3rd Information Technology, Networking, Electronic and Automation Control Conference (ITNEC)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122888271","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Design of Controller for SRM Based on STM32","authors":"Yongfang Xu, Yulin Zhang","doi":"10.1109/ITNEC.2019.8729274","DOIUrl":"https://doi.org/10.1109/ITNEC.2019.8729274","url":null,"abstract":"This motor controller is designed based on the structure and principle of switched reluctance motor (SRM). The control system is based on the STM32 produced by STMicroelectronics and consists of a power supply driver circuit, a driver circuit and a protection circuit. The doubly salient structure of SRM is different from common motors so that its working mode and control method are also different. The control methods used by SRM are current chopping control (CCC), voltage chopping control (VCC), and angular position control (APC). In addition, PI closed-loop control is used to optimize system performance. In this paper, the three-phase 6/4-pole SRM is taken as an example to verify the feasibility and stability of the system design. Finally, the experiment results show that different speed control strategies CCC/VCC based low-speed and APC based high-speed have good dynamic and steady-state response under PI control.","PeriodicalId":202966,"journal":{"name":"2019 IEEE 3rd Information Technology, Networking, Electronic and Automation Control Conference (ITNEC)","volume":"102 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122976527","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Soon-Chang Poh, Yi-Fei Tan, Xiaoning Guo, S. Cheong, C. Ooi, W. Tan
{"title":"LSTM and HMM Comparison for Home Activity Anomaly Detection","authors":"Soon-Chang Poh, Yi-Fei Tan, Xiaoning Guo, S. Cheong, C. Ooi, W. Tan","doi":"10.1109/ITNEC.2019.8729168","DOIUrl":"https://doi.org/10.1109/ITNEC.2019.8729168","url":null,"abstract":"Behavioral changes in daily home activities may be linked with health problems. Therefore, anomaly detection on sequence pattern of home activities is important for healthcare monitoring. In this paper, an anomaly detection method based on Long Short-Term Memory (LSTM) neural network is proposed to detect anomalies on sequence pattern of home activities. A comparison study of LSTM and Hidden Markov Model (HMM) was conducted to evaluate their performance under different training set size and model’s hyperparameters. The experimental results demonstrated that LSTM is comparable to HMM in detecting anomalies on sequence pattern of home activities. The test accuracies of the best LSTM and HMM models are both 87.50%.","PeriodicalId":202966,"journal":{"name":"2019 IEEE 3rd Information Technology, Networking, Electronic and Automation Control Conference (ITNEC)","volume":"178 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122103246","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Verifying nondeterministic processes driven by broadcasts on Android","authors":"Chu Luo, Xu Ma, Yanshan Tian, Jorge Gonçalves, Eduardo Velloso, V. Kostakos","doi":"10.1109/ITNEC.2019.8729296","DOIUrl":"https://doi.org/10.1109/ITNEC.2019.8729296","url":null,"abstract":"Broadcasts in Android facilitate inner-process and inter-process communications. Although broadcasts enable high scalability and loose coupling in achieving collaboration among system components, there is no support for developers to verify the correctness of broadcast-driven nondeterministic processes. To overcome this challenge, we propose a verification approach for systems driven by all the four types of Android broadcasts. Our approach uses the PROMELA language to model broadcast senders and receivers, with regards to unique features of each broadcast type. Based on our design of initialisation procedures, developers can verify properties of their systems using the SPIN model checker. We evaluate our approach in a case study on an example system. Results show that our approach can effectively conduct verification in terms of safety, liveness and never claims with limited computing resources.","PeriodicalId":202966,"journal":{"name":"2019 IEEE 3rd Information Technology, Networking, Electronic and Automation Control Conference (ITNEC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129307965","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Study of Light Beam Tracking based on Compound Axis Control","authors":"Feng Jing, Xin Zhang, Zhiyuan Cheng, Yu Cao, Xuezheng Lian, Yongqing Yang","doi":"10.1109/ITNEC.2019.8728977","DOIUrl":"https://doi.org/10.1109/ITNEC.2019.8728977","url":null,"abstract":"Compound axis control technology has the advantage of high-precision dynamic tracking, and is widely used in high-precision electro-optical tracking system, laser communication and other fields. For the applications of airborne and shipboard platforms, the compound axis control system will be seriously affected by the disturbance torque. In order to overcome the influence of the disturbance torque, this paper applies the disturbance observer to the compound axis control to improve the precision of the compound axis control system. The simulation and analysis of the improved compound axis control system prove the effectiveness of the method.","PeriodicalId":202966,"journal":{"name":"2019 IEEE 3rd Information Technology, Networking, Electronic and Automation Control Conference (ITNEC)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129107344","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Survey on Event Extraction Technology in Information Extraction Research Area","authors":"Liying Zhan, Xuping Jiang","doi":"10.1109/ITNEC.2019.8729158","DOIUrl":"https://doi.org/10.1109/ITNEC.2019.8729158","url":null,"abstract":"Event extraction is one of the most challenging tasks in the field of information extraction. The research of event extraction technology has important theoretical significance and wide application value. This paper makes a survey of event extraction technology, describes the tasks and related concepts of event extraction, analyzes, compares and generalizes the relevant descriptions in different fields. Then analyzes, compares and summarizes the three main methods of event extraction. These methods have their own advantages and disadvantages. The methods based on rules and templates are more mature, the method based on statistical machine learning is dominant, and the method based on deep learning is the future development trend. At the same time, this paper also reviews the research status and key technologies of event extraction, and finally summarizes the current challenges and future research trends of event extraction technology.","PeriodicalId":202966,"journal":{"name":"2019 IEEE 3rd Information Technology, Networking, Electronic and Automation Control Conference (ITNEC)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130639165","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Using Collaborative Filtering Algorithms Combined with Doc2Vec for Movie Recommendation","authors":"G. Liu, Xingyu Wu","doi":"10.1109/ITNEC.2019.8729076","DOIUrl":"https://doi.org/10.1109/ITNEC.2019.8729076","url":null,"abstract":"Information recommendation methods mainly include collaborative filtering and content-based. The collaborative filtering method is the most widely used recommendation method. It mainly uses the preferences of a group with similar interest or shared experience to recommend information of interest to users, but it will encounter serious data sparseness and cold start problems. In this paper, we propose a film recommendation model based on word vector features. The Doc2Vec model is used to extract the semantics, grammar and word order of the sentence, transform it into a fixed dimension vector, and the similarity of the vector will be calculated and applied to the collaborative filtering recommendation algorithm. Experiments show that the recommendation results are improved in both accuracy and recall.","PeriodicalId":202966,"journal":{"name":"2019 IEEE 3rd Information Technology, Networking, Electronic and Automation Control Conference (ITNEC)","volume":"2020 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131476065","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}