{"title":"Machine Learning Based Fault Type Identification In the Active Distribution Network","authors":"B. Sun, Hengxu Zhang, Fang Shi","doi":"10.1109/ITNEC.2019.8729054","DOIUrl":"https://doi.org/10.1109/ITNEC.2019.8729054","url":null,"abstract":"To realize the intelligent of the distribution network, it is necessary to identify the fault type accurately. This paper presents the fault type identification method based on machine learning in active distribution networks. The process of machine learning is divided into four steps: data preparation, data preprocessing, feature extraction and model training. When preparing data, a method of generating fault scenarios in the batch of simulation experiments is presented. The IEEE34 Bus System is built in PSCAD to complete the data preparation for machine learning. Variation multiples of voltage and current are extracted as the features to describe the fault type. Various machine learning models are trained by cross-validation method to get the accuracy of identification. The application of decision tree in fault type identification is presented in the form of a tree diagram. The result of fault type identification is shown by the confusion matrix of the decision tree. All the test results show that the proposed fault identifiers can identify all kinds of fault types in the distribution network.","PeriodicalId":202966,"journal":{"name":"2019 IEEE 3rd Information Technology, Networking, Electronic and Automation Control Conference (ITNEC)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121738578","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on Network Traffic Identification based on Machine Learning and Deep Packet Inspection","authors":"Bowen Yang, Dong Liu","doi":"10.1109/ITNEC.2019.8729153","DOIUrl":"https://doi.org/10.1109/ITNEC.2019.8729153","url":null,"abstract":"Accurate network traffic identification is an important basis for network traffic monitoring and data analysis, and is the key to improve the quality of user service. In this paper, through the analysis of two network traffic identification methods based on machine learning and deep packet inspection, a network traffic identification method based on machine learning and deep packet inspection is proposed. This method uses deep packet inspection technology to identify most network traffic, reduces the workload that needs to be identified by machine learning method, and deep packet inspection can identify specific application traffic, and improves the accuracy of identification. Machine learning method is used to assist in identifying network traffic with encryption and unknown features, which makes up for the disadvantage of deep packet inspection that can not identify new applications and encrypted traffic. Experiments show that this method can improve the identification rate of network traffic.","PeriodicalId":202966,"journal":{"name":"2019 IEEE 3rd Information Technology, Networking, Electronic and Automation Control Conference (ITNEC)","volume":"295 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128858304","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"NBI Snubber power control system and reliability design","authors":"Lu Yang, Song Wang","doi":"10.1109/ITNEC.2019.8729222","DOIUrl":"https://doi.org/10.1109/ITNEC.2019.8729222","url":null,"abstract":"NBI is generally believed to be the most effective heating mode for Experimental Advanced Superconducting Tokamak (EAST). To avoid breakdown energy causes serious damage to the accelerating electrode of ion source. A snubber with power supply is used to protect it. This paper presents an implementation of snubber power control system and reliability design. The implementation consists of three modules and provides three control modes, which realizes access to NBI control center and protection of ion source. The experimental results demonstrate the effectiveness of snubber power control system.","PeriodicalId":202966,"journal":{"name":"2019 IEEE 3rd Information Technology, Networking, Electronic and Automation Control Conference (ITNEC)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128358029","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design of Intelligent Classroom Attendance System Based on Face Recognition","authors":"Wenxian Zeng, Qinglin Meng, Ran Li","doi":"10.1109/ITNEC.2019.8729496","DOIUrl":"https://doi.org/10.1109/ITNEC.2019.8729496","url":null,"abstract":"It is time-consuming and laborious for classroom attendance methods in Chinese universities, and the attendance costs are too high. In this paper, we use the deep learning related ideas to improve the AlexNet convolutional neural network, and use the WebFace data set to improve the network training and test. The Top-5 error rate is only 6.73%. We applied this model to face recognition and combined with RFID card reading technology, which developed a smart classroom attendance system based on face recognition. Research shows that the system is efficient and stable, which effectively reduce classroom attendance costs.","PeriodicalId":202966,"journal":{"name":"2019 IEEE 3rd Information Technology, Networking, Electronic and Automation Control Conference (ITNEC)","volume":"81 5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122593285","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jiangfan Gao, Jianhui Chen, Shun Zhang, Xiaobo He, Shaofu Lin
{"title":"Recognizing Biomedical Named Entities by Integrating Domain Contextual Relevance Measurement and Active Learning","authors":"Jiangfan Gao, Jianhui Chen, Shun Zhang, Xiaobo He, Shaofu Lin","doi":"10.1109/ITNEC.2019.8728991","DOIUrl":"https://doi.org/10.1109/ITNEC.2019.8728991","url":null,"abstract":"Named entity recognition is a basic and core task of biomedical text mining. Comparing with other named entity recognition methods, methods based on domain relevance measurement need the smaller training corpora and entity samples and are appropriate for recognizing narrow-domain entities, which belong to a subdivision and small semantic class. However, how to obtain the high-quality target corpus set become a key issue. This paper propose a biomedicine named entity recognition method by integrating domain contextual relevance measurement and active learning. Firstly, binding with densitybased clustering and semantic distance measurement, the representative and informative contexts are selected to construct the target corpus set by an active learning approach. Secondly, the domain contextual relevance of candidate entities is calculated by using Domain the discrimination degree and domain dependence function for recognizing the target entities. Experimental results show that the proposed method can effectively reduce training time and improve the accuracy of entity recognition.","PeriodicalId":202966,"journal":{"name":"2019 IEEE 3rd Information Technology, Networking, Electronic and Automation Control Conference (ITNEC)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123818852","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Safety Helmet Wearing Detection Based On Deep Learning","authors":"Xitian Long, WenpengCui Cui, Zhe Zheng","doi":"10.1109/ITNEC.2019.8729039","DOIUrl":"https://doi.org/10.1109/ITNEC.2019.8729039","url":null,"abstract":"In many scenarios, such as power station, the detection of whether wearing safety helmets or not for perambulatory workers is very essential for the safety issue. So far, research in safety helmets wearing detection mainly focused on hand-crafted features, such as color or shape. With rising success of deep learning, accurately detecting objects by training the deep convolutional neural network (DCNN) becomes a very effective way. This paper presents a deep learning approach for accurate safety helmets wearing detection in employing a single shot multi-box detector (SSD). Moreover, because of safety helmet usually relatively small and unfortunately SSD struggles in detecting very small objects, a novel and practical safety helmet wearing detecting system is proposed, Finally, extensive compelling experimental results in power substation illustrate the efficiency and effectiveness of our work.","PeriodicalId":202966,"journal":{"name":"2019 IEEE 3rd Information Technology, Networking, Electronic and Automation Control Conference (ITNEC)","volume":"94 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126228378","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Bitao Jiang, Xiaobin Li, Lu Yin, Wenzhen Yue, Shengiin Wang
{"title":"Object Recognition in Remote Sensing Images Using Combined Deep Features","authors":"Bitao Jiang, Xiaobin Li, Lu Yin, Wenzhen Yue, Shengiin Wang","doi":"10.1109/ITNEC.2019.8729392","DOIUrl":"https://doi.org/10.1109/ITNEC.2019.8729392","url":null,"abstract":"Object recognition, which is also referred as object classification or object type recognition, aims at discriminating object types in remote sensing images. With the availability of high resolution remote sensing images, object recognition attracts more and more attention. Different from traditional methods mainly using hand-crafted features, we propose an object recognition method that combines deep features extracted from a convolutional neural network (CNN) to recognize aircrafts and ships in remote sensing images. The proposed method consists of two stages. In the training stage, images of objects with different types and corresponding labels are exploited to fine-tune a pre-trained CNN. Convolutional features are extracted from a convolutional layer of the fine-tuned CNN and pooled by Fisher Vector, and fully-connected features are extracted from a fully-connected layer of the CNN. These features are combined by concatenation and used to train a support vector machine (SVM). In the test stage, the type of each object is determined by the trained SVM using its combined features. Experiments on two data sets collected from Google Earth demonstrate the effectiveness of our method.","PeriodicalId":202966,"journal":{"name":"2019 IEEE 3rd Information Technology, Networking, Electronic and Automation Control Conference (ITNEC)","volume":"2008 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127310769","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Novel Modbus Adaptation Method for IoT Gateway","authors":"Feng Shu, Hanhua Lu, Yin Ding","doi":"10.1109/ITNEC.2019.8729209","DOIUrl":"https://doi.org/10.1109/ITNEC.2019.8729209","url":null,"abstract":"The Internet of Things (IoT) gateway is the link between the sensing layer and the network layer in the IoT system and undertake the task of encapsulating IoT sensed information into network packets and sending them to the backend server. In order to access the various types of sensors of the sensing layer, it is necessary to adapt each protocol of the sensors. The Modbus protocol is widely used in industry and this paper proposes a novel adaptation method for it. This method enables the bidirectional conversion between Modbus slave data and sensing/actuating application data. This conversion process masks the details of Modbus data processing during the conversion process, allowing applications to use the sensing/execution information represented by the data directly, simplifying application development.","PeriodicalId":202966,"journal":{"name":"2019 IEEE 3rd Information Technology, Networking, Electronic and Automation Control Conference (ITNEC)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125653728","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Qiao Su, Yimin Wei, Changliang Deng, Yue-hong Shen
{"title":"Source Enumeration Based on Spatial Correlation Function for Independent/Dependent Sources","authors":"Qiao Su, Yimin Wei, Changliang Deng, Yue-hong Shen","doi":"10.1109/ITNEC.2019.8729080","DOIUrl":"https://doi.org/10.1109/ITNEC.2019.8729080","url":null,"abstract":"The detection of the number of sources when the sources may be dependent and more than the sensors is a challenging problem. This paper proposes a new method to address this problem, which is mainly based on the spatial correlation function and the Gerschgorin disk estimator (GDE). Compared to the fourth-order cumulant-based source enumeration methods presented recently, the proposed method requires much fewer samples to accurately estimate the source number and can work well even when the sources are dependent. Simulation results show that the proposed method possesses superior detection performance over the existing methods for source enumeration under an unbalance noise environment, and testify the effectiveness of the proposed algorithm for both the independent and dependent sources.","PeriodicalId":202966,"journal":{"name":"2019 IEEE 3rd Information Technology, Networking, Electronic and Automation Control Conference (ITNEC)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133408689","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cloud Computing Task Scheduling Algorithm Based On Improved Genetic Algorithm","authors":"Fang Yiqiu, Xiaoyu Xia, Ge Junwei","doi":"10.1109/ITNEC.2019.8728996","DOIUrl":"https://doi.org/10.1109/ITNEC.2019.8728996","url":null,"abstract":"Because of the continuous promotion of cloud computing applications, the demand for data processing in cloud computing is increasing. Users have higher requirements for the service quality of cloud computing, the high efficiency of cloud computing task scheduling algorithm plays a key role in the cloud computing. How to scheduling the computing resources efficiently, all tasks can be completed in the least time and cost is an important issue in cloud computing research. In this paper, a method of initial optimization on the crossover mutation probability of adaptive genetic algorithm (AGA) using binary coded chromosomes is proposed. Through experiments, the improved adaptive genetic algorithm is compared with the adaptive genetic algorithm (AGA) and the standard genetic algorithm (SGA). The experimental results show that the improved algorithm is an effective cloud computing task scheduling algorithm.","PeriodicalId":202966,"journal":{"name":"2019 IEEE 3rd Information Technology, Networking, Electronic and Automation Control Conference (ITNEC)","volume":"190 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116281294","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}