2019 IEEE 3rd Information Technology, Networking, Electronic and Automation Control Conference (ITNEC)最新文献

筛选
英文 中文
Analysis and Design for hybrid Magnetic Levitation Controller in Medium-Low Speed Maglev Train 中低速磁悬浮列车混合磁悬浮控制器的分析与设计
L. Zong, Xiaolong Li, Weihua Dong, Mingda Zhai
{"title":"Analysis and Design for hybrid Magnetic Levitation Controller in Medium-Low Speed Maglev Train","authors":"L. Zong, Xiaolong Li, Weihua Dong, Mingda Zhai","doi":"10.1109/ITNEC.2019.8729432","DOIUrl":"https://doi.org/10.1109/ITNEC.2019.8729432","url":null,"abstract":"The medium-low speed maglev train makes full use of electromagnetic force to achieve active levitation and drives the train by the linear motor. In order to increase the carrying capacity of maglev train significantly and improve the levitation energy consumption, a new hybrid levitation system comprised of permanent magnet and electromagnet is proposed and applied to the medium-low speed maglev train. In this paper, the mathematical model of hybrid levitation system is established, and the controller is designed to have the ability to levitate the maglev train stably.","PeriodicalId":202966,"journal":{"name":"2019 IEEE 3rd Information Technology, Networking, Electronic and Automation Control Conference (ITNEC)","volume":"145 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116908809","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Denoising of Power Quality Disturbance Signal Based on Ant Colony optimization Wavelet Threshold Estimation 基于蚁群优化小波阈值估计的电能质量干扰信号去噪
Shenli Gu, Xifeng Zhou, Qiangang Guo
{"title":"Denoising of Power Quality Disturbance Signal Based on Ant Colony optimization Wavelet Threshold Estimation","authors":"Shenli Gu, Xifeng Zhou, Qiangang Guo","doi":"10.1109/ITNEC.2019.8729061","DOIUrl":"https://doi.org/10.1109/ITNEC.2019.8729061","url":null,"abstract":"Based on the problem of the fast and effectively extraction for condition signals of electrical plants in digital substation, this paper presents an approach of ant colony optimization threshold estimation (ACOTE) for de-noising of partial discharge (PD) signals. A class of shrinkage functions with continuous derivatives based on the SURE estimation and ACO estimation are utilized for the threshold estimation. The ACO estimation is competent to obtain the global optimum thresholds and to raise the efficiency of adaptive searching computation. For verifying the de-noising results, two methods of standard soft wavelet threshold estimation (STE) and standard hard wavelet threshold estimation (HTE) are used for de-noising of two typical artificial stable signals, simulative PD signal and the field PD signal. The results show that the white noise can be removed effectively by the ACOTE, the distortion of which is smaller than the signals de-noised by the STE and HTE. Meanwhile, the ACOTE is a much less time-consuming scheme and exhibits a promising prospect in practical application.","PeriodicalId":202966,"journal":{"name":"2019 IEEE 3rd Information Technology, Networking, Electronic and Automation Control Conference (ITNEC)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117159318","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Design and Implementation Method of IPSec Security Chip for Power Distribution Network System Based on National Cryptographic Algorithms 一种基于国家密码算法的配电网IPSec安全芯片的设计与实现方法
W. Xi, Siliang Suo, Tiantian Cai, Ganyang Jian, Hao Yao, Lin Fan
{"title":"A Design and Implementation Method of IPSec Security Chip for Power Distribution Network System Based on National Cryptographic Algorithms","authors":"W. Xi, Siliang Suo, Tiantian Cai, Ganyang Jian, Hao Yao, Lin Fan","doi":"10.1109/ITNEC.2019.8729305","DOIUrl":"https://doi.org/10.1109/ITNEC.2019.8729305","url":null,"abstract":"The target of security protection of the power distribution automation system (the distribution system for short) is to ensure the security of communication between the distribution terminal (terminal for short) and the distribution master station (master system for short). The encryption and authentication gateway (VPN gateway for short) for distribution system enhances the network layer communication security between the terminal and the VPN gateway. The distribution application layer encryption authentication device (master cipher machine for short) ensures the confidentiality and integrity of data transmission in application layer, and realizes the identity authentication between the master station and the terminal. All these measures are used to prevent malicious damage and attack to the master system by forging terminal identity, replay attack and other illegal operations, in order to prevent the resulting distribution network system accidents. Based on the security protection scheme of the power distribution automation system, this paper carries out the development of multi-chip encapsulation, develops IPSec Protocols software within the security chip, and realizes dual encryption and authentication function in IP layer and application layer supporting the national cryptographic algorithm.","PeriodicalId":202966,"journal":{"name":"2019 IEEE 3rd Information Technology, Networking, Electronic and Automation Control Conference (ITNEC)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130463705","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A survey on mobile edge platform with blockchain 基于区块链的移动边缘平台调查
Yujin Zhu
{"title":"A survey on mobile edge platform with blockchain","authors":"Yujin Zhu","doi":"10.1109/ITNEC.2019.8729149","DOIUrl":"https://doi.org/10.1109/ITNEC.2019.8729149","url":null,"abstract":"As the Internet of Things (IoT), 5G and embedded artificial cloud computing develop, cloud computing is encountering growing challenges such as stringent latency requirements, network bandwidth constraints, etc. Edge computing proposes to bring computing and storage closer to user ends (UEs). Furthermore, mobile edge computing (MEC) aims to combine edge computing and cloud computing to offer better latency and user experience. However, cloud computing exists some inherent weakness, such as data loss and leakage, threats to data privacy, etc. We propose a blockchain-based MEC platform, called BlockMEC, that consists of unknown devices to distribute computing, control, storage, and networking functions to the edge of network without involving any central controllers. The survey paper also summarizes typical MEC concepts and makes comparisons between them and BlockMEC.","PeriodicalId":202966,"journal":{"name":"2019 IEEE 3rd Information Technology, Networking, Electronic and Automation Control Conference (ITNEC)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121852452","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Feature Selection of Parallel Binary Moth-flame Optimization Algorithm Based on Spark 基于Spark的并行二进制蛾焰优化算法特征选择
Hongwe Chen, Heng Fu, Qianqian Cao, Lin Han, Lingyu Yan
{"title":"Feature Selection of Parallel Binary Moth-flame Optimization Algorithm Based on Spark","authors":"Hongwe Chen, Heng Fu, Qianqian Cao, Lin Han, Lingyu Yan","doi":"10.1109/ITNEC.2019.8729350","DOIUrl":"https://doi.org/10.1109/ITNEC.2019.8729350","url":null,"abstract":"In view of the good classification ability of Moth-Flame Optimization (MFO) in reducing feature redundancy, this paper applied MFO algorithm to feature selection. However, the MFO algorithm is easy to fall into local optimum and has a weak search ability, which severely limits the classification performance and dimensional reduction ability of the algorithm. Therefore, this paper combined MFO algorithm with distributed parallel computing Spark platform distributed, and proposed a feature selection method based on Spark Parallel Binary Moth-Flame Optimization (SPBMFO) algorithm. The experimental results show that compared with the classical particle swarm optimization algorithm(PSO), the genetic algorithm(GA) and the cuckoo search algorithm(CS), when using the binary MFO algorithm for feature selection, the selected features are improved by 12.5%, 15% and 2.5%, respectively. SPBMFO algorithm avoids the search process falling into local optimum and improve the classification performance of the algorithm, which minimizes the number of features while maximizing the classification performance.","PeriodicalId":202966,"journal":{"name":"2019 IEEE 3rd Information Technology, Networking, Electronic and Automation Control Conference (ITNEC)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123585717","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
An Emotional Symbolic Music Generation System based on LSTM Networks 基于LSTM网络的情感符号音乐生成系统
Kun Zhao, Siqi Li, Juanjuan Cai, Hui Wang, Jingling Wang
{"title":"An Emotional Symbolic Music Generation System based on LSTM Networks","authors":"Kun Zhao, Siqi Li, Juanjuan Cai, Hui Wang, Jingling Wang","doi":"10.1109/ITNEC.2019.8729266","DOIUrl":"https://doi.org/10.1109/ITNEC.2019.8729266","url":null,"abstract":"With the development of AI technology in recent years, Neural Networks have been used in the task of algorithmic music composition and have achieved desirable results. Music is highly associated with human emotion, however, there are few attempts of intelligent music composition in the scene of expressing different emotions. In this work, Biaxial LSTM networks have been used to generate polyphonic music, and the thought of LookBack is also introduced into the architecture to improve the long-term structure. Above all, we design a novel system for emotional music generation with a manner of steerable parameters for 4 basic emotions divided by Russell’s 2-demonsion valence-arousal (VA) emotional space. The evaluation indices of generated music by this model is closer to real music, and via human listening test, it shows that the different affects expressed by the generated emotional samples can be distinguished correctly in majority.","PeriodicalId":202966,"journal":{"name":"2019 IEEE 3rd Information Technology, Networking, Electronic and Automation Control Conference (ITNEC)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117058443","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 33
Metrics for Graph Partition by Using Machine Learning Techniques 基于机器学习技术的图划分度量
Z. Yin, Z. Cao
{"title":"Metrics for Graph Partition by Using Machine Learning Techniques","authors":"Z. Yin, Z. Cao","doi":"10.1109/ITNEC.2019.8729187","DOIUrl":"https://doi.org/10.1109/ITNEC.2019.8729187","url":null,"abstract":"In our previous work, we explored the possibility of applying machine learning technique to graph partition. We use some metrics to describe the graph, rank the execution time of some graph algorithm and feed them into the machine learning models. We proved that decision tree and KNN and good models of this problem. In the paper, we go on to investigate more metrics to describe the graph after partitioning. We found that AverageDegreeNotCut is also an important metric. We improve the precision score of original machine learning models by 4.9 percent.","PeriodicalId":202966,"journal":{"name":"2019 IEEE 3rd Information Technology, Networking, Electronic and Automation Control Conference (ITNEC)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114907111","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Robust Malware Detection System Using Deep Learning on API Calls 基于API调用的深度学习鲁棒恶意软件检测系统
Yingying Liu, Yiwei Wang
{"title":"A Robust Malware Detection System Using Deep Learning on API Calls","authors":"Yingying Liu, Yiwei Wang","doi":"10.1109/ITNEC.2019.8728992","DOIUrl":"https://doi.org/10.1109/ITNEC.2019.8728992","url":null,"abstract":"With the development of technology, the massive malware become the major challenge to current computer security. In our work, we implemented a malware detection system using deep learning on API calls. By means of cuckoo sandbox, we extracted the API calls sequence of malicious programs. Through filtering and ordering the redundant API calls, we extracted the valid API sequences. Compared with GRU, BGRU, LSTM and SimpleRNN, we evaluated the BLSTM on the massive datasets including 21,378 samples. The experimental results demonstrate that BLSTM has the best performance for malware detection, reaching the accuracy of 97.85%.","PeriodicalId":202966,"journal":{"name":"2019 IEEE 3rd Information Technology, Networking, Electronic and Automation Control Conference (ITNEC)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126757873","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Mobile User Emotion Perception based on Weight Loss Mechanism and Support Vector Machine 基于减重机制和支持向量机的移动用户情感感知
Zan Li
{"title":"Mobile User Emotion Perception based on Weight Loss Mechanism and Support Vector Machine","authors":"Zan Li","doi":"10.1109/ITNEC.2019.8729188","DOIUrl":"https://doi.org/10.1109/ITNEC.2019.8729188","url":null,"abstract":"The implementation of mobile users' emotional perception is complex and inefficient at present. Therefore, we propose a method that realizes emotion analysis by exploring the relationship between user emotion and time characteristics, using natural language processing, SVM, and mathematical analysis methods. Then combined the corpus built by ourselves, and the CHI feature extraction method is used to extract the feature from the training data set, the data is transformed into the feature matrix according to the feature values, and the training set is modeled and trained by the SVM method, and then optimize the parameters using genetic algorithm. According to the result of the SVM decision function, the weighted idea is used to weight the data, and its weight is modeled and calculated according to the weight loss mechanism we proposed, and the final result will be obtained as a condition for the determination of emotion perception.","PeriodicalId":202966,"journal":{"name":"2019 IEEE 3rd Information Technology, Networking, Electronic and Automation Control Conference (ITNEC)","volume":"469 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133271643","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Predicting the degree of film transmission based on deep learning 基于深度学习的电影传播程度预测
Bing Wu, Jie Liu, Shuwu Zhang
{"title":"Predicting the degree of film transmission based on deep learning","authors":"Bing Wu, Jie Liu, Shuwu Zhang","doi":"10.1109/ITNEC.2019.8729293","DOIUrl":"https://doi.org/10.1109/ITNEC.2019.8729293","url":null,"abstract":"This With the acceleration of economic globalization, in recent years, the market box office and movie attendants of Chinese films have shown a spurt of development. The popularity of a movie in popularization is directly related to the box office of the film. There are only a handful of academic researches on the prediction of film propagation. It is difficult to provide a reliable reference for the investment and filming of the film. In this regard, this paper analyzes the data of 200,000 film data on Douban, and uses data mining technology to film data. The association study is carried out. Finally, the deep learning method is used to train the film data to analyze the loss function, which proves that the method is feasible.","PeriodicalId":202966,"journal":{"name":"2019 IEEE 3rd Information Technology, Networking, Electronic and Automation Control Conference (ITNEC)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133673170","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信