{"title":"Analysis and Design for hybrid Magnetic Levitation Controller in Medium-Low Speed Maglev Train","authors":"L. Zong, Xiaolong Li, Weihua Dong, Mingda Zhai","doi":"10.1109/ITNEC.2019.8729432","DOIUrl":"https://doi.org/10.1109/ITNEC.2019.8729432","url":null,"abstract":"The medium-low speed maglev train makes full use of electromagnetic force to achieve active levitation and drives the train by the linear motor. In order to increase the carrying capacity of maglev train significantly and improve the levitation energy consumption, a new hybrid levitation system comprised of permanent magnet and electromagnet is proposed and applied to the medium-low speed maglev train. In this paper, the mathematical model of hybrid levitation system is established, and the controller is designed to have the ability to levitate the maglev train stably.","PeriodicalId":202966,"journal":{"name":"2019 IEEE 3rd Information Technology, Networking, Electronic and Automation Control Conference (ITNEC)","volume":"145 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116908809","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Denoising of Power Quality Disturbance Signal Based on Ant Colony optimization Wavelet Threshold Estimation","authors":"Shenli Gu, Xifeng Zhou, Qiangang Guo","doi":"10.1109/ITNEC.2019.8729061","DOIUrl":"https://doi.org/10.1109/ITNEC.2019.8729061","url":null,"abstract":"Based on the problem of the fast and effectively extraction for condition signals of electrical plants in digital substation, this paper presents an approach of ant colony optimization threshold estimation (ACOTE) for de-noising of partial discharge (PD) signals. A class of shrinkage functions with continuous derivatives based on the SURE estimation and ACO estimation are utilized for the threshold estimation. The ACO estimation is competent to obtain the global optimum thresholds and to raise the efficiency of adaptive searching computation. For verifying the de-noising results, two methods of standard soft wavelet threshold estimation (STE) and standard hard wavelet threshold estimation (HTE) are used for de-noising of two typical artificial stable signals, simulative PD signal and the field PD signal. The results show that the white noise can be removed effectively by the ACOTE, the distortion of which is smaller than the signals de-noised by the STE and HTE. Meanwhile, the ACOTE is a much less time-consuming scheme and exhibits a promising prospect in practical application.","PeriodicalId":202966,"journal":{"name":"2019 IEEE 3rd Information Technology, Networking, Electronic and Automation Control Conference (ITNEC)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117159318","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
W. Xi, Siliang Suo, Tiantian Cai, Ganyang Jian, Hao Yao, Lin Fan
{"title":"A Design and Implementation Method of IPSec Security Chip for Power Distribution Network System Based on National Cryptographic Algorithms","authors":"W. Xi, Siliang Suo, Tiantian Cai, Ganyang Jian, Hao Yao, Lin Fan","doi":"10.1109/ITNEC.2019.8729305","DOIUrl":"https://doi.org/10.1109/ITNEC.2019.8729305","url":null,"abstract":"The target of security protection of the power distribution automation system (the distribution system for short) is to ensure the security of communication between the distribution terminal (terminal for short) and the distribution master station (master system for short). The encryption and authentication gateway (VPN gateway for short) for distribution system enhances the network layer communication security between the terminal and the VPN gateway. The distribution application layer encryption authentication device (master cipher machine for short) ensures the confidentiality and integrity of data transmission in application layer, and realizes the identity authentication between the master station and the terminal. All these measures are used to prevent malicious damage and attack to the master system by forging terminal identity, replay attack and other illegal operations, in order to prevent the resulting distribution network system accidents. Based on the security protection scheme of the power distribution automation system, this paper carries out the development of multi-chip encapsulation, develops IPSec Protocols software within the security chip, and realizes dual encryption and authentication function in IP layer and application layer supporting the national cryptographic algorithm.","PeriodicalId":202966,"journal":{"name":"2019 IEEE 3rd Information Technology, Networking, Electronic and Automation Control Conference (ITNEC)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130463705","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A survey on mobile edge platform with blockchain","authors":"Yujin Zhu","doi":"10.1109/ITNEC.2019.8729149","DOIUrl":"https://doi.org/10.1109/ITNEC.2019.8729149","url":null,"abstract":"As the Internet of Things (IoT), 5G and embedded artificial cloud computing develop, cloud computing is encountering growing challenges such as stringent latency requirements, network bandwidth constraints, etc. Edge computing proposes to bring computing and storage closer to user ends (UEs). Furthermore, mobile edge computing (MEC) aims to combine edge computing and cloud computing to offer better latency and user experience. However, cloud computing exists some inherent weakness, such as data loss and leakage, threats to data privacy, etc. We propose a blockchain-based MEC platform, called BlockMEC, that consists of unknown devices to distribute computing, control, storage, and networking functions to the edge of network without involving any central controllers. The survey paper also summarizes typical MEC concepts and makes comparisons between them and BlockMEC.","PeriodicalId":202966,"journal":{"name":"2019 IEEE 3rd Information Technology, Networking, Electronic and Automation Control Conference (ITNEC)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121852452","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Hongwe Chen, Heng Fu, Qianqian Cao, Lin Han, Lingyu Yan
{"title":"Feature Selection of Parallel Binary Moth-flame Optimization Algorithm Based on Spark","authors":"Hongwe Chen, Heng Fu, Qianqian Cao, Lin Han, Lingyu Yan","doi":"10.1109/ITNEC.2019.8729350","DOIUrl":"https://doi.org/10.1109/ITNEC.2019.8729350","url":null,"abstract":"In view of the good classification ability of Moth-Flame Optimization (MFO) in reducing feature redundancy, this paper applied MFO algorithm to feature selection. However, the MFO algorithm is easy to fall into local optimum and has a weak search ability, which severely limits the classification performance and dimensional reduction ability of the algorithm. Therefore, this paper combined MFO algorithm with distributed parallel computing Spark platform distributed, and proposed a feature selection method based on Spark Parallel Binary Moth-Flame Optimization (SPBMFO) algorithm. The experimental results show that compared with the classical particle swarm optimization algorithm(PSO), the genetic algorithm(GA) and the cuckoo search algorithm(CS), when using the binary MFO algorithm for feature selection, the selected features are improved by 12.5%, 15% and 2.5%, respectively. SPBMFO algorithm avoids the search process falling into local optimum and improve the classification performance of the algorithm, which minimizes the number of features while maximizing the classification performance.","PeriodicalId":202966,"journal":{"name":"2019 IEEE 3rd Information Technology, Networking, Electronic and Automation Control Conference (ITNEC)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123585717","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Kun Zhao, Siqi Li, Juanjuan Cai, Hui Wang, Jingling Wang
{"title":"An Emotional Symbolic Music Generation System based on LSTM Networks","authors":"Kun Zhao, Siqi Li, Juanjuan Cai, Hui Wang, Jingling Wang","doi":"10.1109/ITNEC.2019.8729266","DOIUrl":"https://doi.org/10.1109/ITNEC.2019.8729266","url":null,"abstract":"With the development of AI technology in recent years, Neural Networks have been used in the task of algorithmic music composition and have achieved desirable results. Music is highly associated with human emotion, however, there are few attempts of intelligent music composition in the scene of expressing different emotions. In this work, Biaxial LSTM networks have been used to generate polyphonic music, and the thought of LookBack is also introduced into the architecture to improve the long-term structure. Above all, we design a novel system for emotional music generation with a manner of steerable parameters for 4 basic emotions divided by Russell’s 2-demonsion valence-arousal (VA) emotional space. The evaluation indices of generated music by this model is closer to real music, and via human listening test, it shows that the different affects expressed by the generated emotional samples can be distinguished correctly in majority.","PeriodicalId":202966,"journal":{"name":"2019 IEEE 3rd Information Technology, Networking, Electronic and Automation Control Conference (ITNEC)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117058443","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Metrics for Graph Partition by Using Machine Learning Techniques","authors":"Z. Yin, Z. Cao","doi":"10.1109/ITNEC.2019.8729187","DOIUrl":"https://doi.org/10.1109/ITNEC.2019.8729187","url":null,"abstract":"In our previous work, we explored the possibility of applying machine learning technique to graph partition. We use some metrics to describe the graph, rank the execution time of some graph algorithm and feed them into the machine learning models. We proved that decision tree and KNN and good models of this problem. In the paper, we go on to investigate more metrics to describe the graph after partitioning. We found that AverageDegreeNotCut is also an important metric. We improve the precision score of original machine learning models by 4.9 percent.","PeriodicalId":202966,"journal":{"name":"2019 IEEE 3rd Information Technology, Networking, Electronic and Automation Control Conference (ITNEC)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114907111","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Robust Malware Detection System Using Deep Learning on API Calls","authors":"Yingying Liu, Yiwei Wang","doi":"10.1109/ITNEC.2019.8728992","DOIUrl":"https://doi.org/10.1109/ITNEC.2019.8728992","url":null,"abstract":"With the development of technology, the massive malware become the major challenge to current computer security. In our work, we implemented a malware detection system using deep learning on API calls. By means of cuckoo sandbox, we extracted the API calls sequence of malicious programs. Through filtering and ordering the redundant API calls, we extracted the valid API sequences. Compared with GRU, BGRU, LSTM and SimpleRNN, we evaluated the BLSTM on the massive datasets including 21,378 samples. The experimental results demonstrate that BLSTM has the best performance for malware detection, reaching the accuracy of 97.85%.","PeriodicalId":202966,"journal":{"name":"2019 IEEE 3rd Information Technology, Networking, Electronic and Automation Control Conference (ITNEC)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126757873","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Mobile User Emotion Perception based on Weight Loss Mechanism and Support Vector Machine","authors":"Zan Li","doi":"10.1109/ITNEC.2019.8729188","DOIUrl":"https://doi.org/10.1109/ITNEC.2019.8729188","url":null,"abstract":"The implementation of mobile users' emotional perception is complex and inefficient at present. Therefore, we propose a method that realizes emotion analysis by exploring the relationship between user emotion and time characteristics, using natural language processing, SVM, and mathematical analysis methods. Then combined the corpus built by ourselves, and the CHI feature extraction method is used to extract the feature from the training data set, the data is transformed into the feature matrix according to the feature values, and the training set is modeled and trained by the SVM method, and then optimize the parameters using genetic algorithm. According to the result of the SVM decision function, the weighted idea is used to weight the data, and its weight is modeled and calculated according to the weight loss mechanism we proposed, and the final result will be obtained as a condition for the determination of emotion perception.","PeriodicalId":202966,"journal":{"name":"2019 IEEE 3rd Information Technology, Networking, Electronic and Automation Control Conference (ITNEC)","volume":"469 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133271643","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Predicting the degree of film transmission based on deep learning","authors":"Bing Wu, Jie Liu, Shuwu Zhang","doi":"10.1109/ITNEC.2019.8729293","DOIUrl":"https://doi.org/10.1109/ITNEC.2019.8729293","url":null,"abstract":"This With the acceleration of economic globalization, in recent years, the market box office and movie attendants of Chinese films have shown a spurt of development. The popularity of a movie in popularization is directly related to the box office of the film. There are only a handful of academic researches on the prediction of film propagation. It is difficult to provide a reliable reference for the investment and filming of the film. In this regard, this paper analyzes the data of 200,000 film data on Douban, and uses data mining technology to film data. The association study is carried out. Finally, the deep learning method is used to train the film data to analyze the loss function, which proves that the method is feasible.","PeriodicalId":202966,"journal":{"name":"2019 IEEE 3rd Information Technology, Networking, Electronic and Automation Control Conference (ITNEC)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133673170","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}