{"title":"Simulation of surface mounted PMSM Vector Control Based on Fuzzy PI control","authors":"Junfeng Chen, Jian Liu, Chaofan Zhang","doi":"10.1109/AICIT55386.2022.9930299","DOIUrl":"https://doi.org/10.1109/AICIT55386.2022.9930299","url":null,"abstract":"Permanent magnet synchronous motor (PMSM) is a nonlinear, strong coupling and time-varying parameter control system. Although conventional PI regulator can realize the vector control technology of PMSM, it can not adjust the changing parameters of the system in real time. Therefore, this paper combines PI regulator with fuzzy control theory to realize the vector control technology of PMSM through variable fuzzification, fuzzy reasoning and defuzzification, Compared with the vector control simulation model of conventional PI regulator, it can be clearly found that the vector control based on Fuzzy PI regulator has faster response speed, stronger anti-interference performance and other functions, and is more in line with the high-performance driving requirements of PMSM.","PeriodicalId":231070,"journal":{"name":"2022 International Conference on Artificial Intelligence and Computer Information Technology (AICIT)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123647831","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Study of PWM Digital Technologies for Static Var Generator Based on FPGA Technology","authors":"Xia Han, Chaofan Zhang, Jian Liu, Xiaomeng Wei","doi":"10.1109/AICIT55386.2022.9930302","DOIUrl":"https://doi.org/10.1109/AICIT55386.2022.9930302","url":null,"abstract":"Digital pulse width modulation can improve the output accuracy of PWM control signal, shorten the response time of SVG device, and increase the safety and stability of the system. Combined with the characteristics of the inverter circuit of high-power static var generator, this paper studies the digital theory of sinusoidal pulse width modulation (PWM). The full digitalization framework of field programmable gate array (FPGA) is constructed, and the realization method of regular sampling PWM digitalization is studied. This paper uses very high speed integrated circuit hardware description language (VHDL) and Xilinx XC6SLX16 FPGA chip to program the theoretical research content. The experimental results prove the correctness and feasibility of the digital theory in this paper.","PeriodicalId":231070,"journal":{"name":"2022 International Conference on Artificial Intelligence and Computer Information Technology (AICIT)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128377071","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Zhichao Cao, Guohong Yi, Bingqian Wu, Jianting Li, D. Xiao
{"title":"Analysis And Improvement of AES Key Expansion Algorithm","authors":"Zhichao Cao, Guohong Yi, Bingqian Wu, Jianting Li, D. Xiao","doi":"10.1109/AICIT55386.2022.9930239","DOIUrl":"https://doi.org/10.1109/AICIT55386.2022.9930239","url":null,"abstract":"Based on the analysis of the Advanced Encryption Standard (AES) algorithm and the existing improved algorithms, the AES key extension algorithm is improved and optimized to address the shortcomings of the existing traditional algorithm and the improved algorithm, i.e., the strong correlation between the round keys of the AES key extension algorithm brings a layer of security risks to the AES algorithm as a whole. The three improvement ideas of irreversible improvement strategy, introduction of random number strategy and word shift strategy and the combination of the three ideas are proposed. The three improvement ideas are designed from three perspectives of reducing the correlation between round keys, reducing the correlation between round keys and optimizing the running time of the algorithm, and the corresponding three algorithm models are designed and the three improvement algorithms are simulated for several times. By analyzing the security and efficiency of the algorithm theoretical and experimental results, it is shown that the improved algorithm can ensure the efficient operation of the algorithm on the premise of ensuring the security of the key expansion algorithm and improve the overall anti-attack performance of the AES algorithm to a certain extent.","PeriodicalId":231070,"journal":{"name":"2022 International Conference on Artificial Intelligence and Computer Information Technology (AICIT)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126482123","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Application Review of PCM-based Thermal Storage in Buildings towards Carbon Neutrality: Modeling, Forecasting and Optimal Control with AI","authors":"Bei Lu, Jinghui Yu, Wenjing Su, Y. Zong","doi":"10.1109/AICIT55386.2022.9930249","DOIUrl":"https://doi.org/10.1109/AICIT55386.2022.9930249","url":null,"abstract":"Due to the rising greenhouse gases in the atmosphere, global warming is becoming a common problem for humankind. Building decarbonisation is one of the important ways to solve the greenhouse effect. In buildings, both active applications of combining phase change materials (PCM) with thermal storage devices, and passive applications of PCM embedded in building walls are very common. This review paper summarizes and classifies the application of PCM based thermal storage in buildings, mainly investigates the models and optimal control strategies of building energy management systems (BEMS) integrating PCM in green buildings’ applications, and discusses in detail the important role of artificial intelligence (AI) in multi-objective optimization and energy consumption prediction for BEMS, and finally proposes future research directions.","PeriodicalId":231070,"journal":{"name":"2022 International Conference on Artificial Intelligence and Computer Information Technology (AICIT)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125315069","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A K-means Optimized by Improved Grey Wolf Algorithm Anomaly Detection method for Wireless Sensor Networks","authors":"Cenchang Li, Xingfeng Guo, Yuanfeng Huang","doi":"10.1109/AICIT55386.2022.9930210","DOIUrl":"https://doi.org/10.1109/AICIT55386.2022.9930210","url":null,"abstract":"Anomaly detection in wireless sensor networks is crucial for the implementation of tasks such as fault diagnosis, intrusion detection, and event monitoring. Under existing research, a large number of anomaly detection algorithms use supervised or semi-supervised algorithms to solve a specific application scenario problem. However, in wireless sensor network multi-scenario applications, the feature definition for anomaly data is not available a priori. In this paper, an unsupervised algorithm based on K-means is proposed to solve this problem. Since the effect of K-means algorithm is sensitive to the number of clusters and the selection of initial points, it is easy to fall into local optimum. To enhance the reliability of the algorithm, the gray wolf algorithm is used to find the original cluster centers, and then the clustering results are compared with the weighted neighboring clusters to determine whether the edge points or edge clusters are abnormal data. The experimental results show that the accuracy, recall and F1 value of the algorithm are significantly improved compared with K-means algorithm and other algorithms optimizing K-means under different wireless sensor network data sets.","PeriodicalId":231070,"journal":{"name":"2022 International Conference on Artificial Intelligence and Computer Information Technology (AICIT)","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125957970","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analysis on Operation Characteristics of Ground Distance Protection for the Mixed Voltage Four Circuit Transmission Lines on the Same Tower","authors":"Song Leiming, Tang Cui, Xu Qi","doi":"10.1109/AICIT55386.2022.9930187","DOIUrl":"https://doi.org/10.1109/AICIT55386.2022.9930187","url":null,"abstract":"According to the structural feature that the phase to phase coupling of the mixed voltage non transposed four circuit transmission line on the same tower leads to parameter asymmetry, combined with the original data of Shuixiang-Wancheng transmission line, a line simulation model is built by PSCAD. On this basis, the effects of fault location, transition resistance and fault type on the performance of fault component impedance relay, quadrilateral characteristic distance relay and zero sequence reactance relay are analyzed and studied. The above research results can provide reference for the function configuration, setting calculation and engineering application of distance protection for complex lines on the same tower.","PeriodicalId":231070,"journal":{"name":"2022 International Conference on Artificial Intelligence and Computer Information Technology (AICIT)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117106391","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Out-of-Step Protection in Generator Based on Intelligent Identification of Impedance Trajectory","authors":"Zhenxing Li, Yangze Wang, Cong Hu, Yi Zhu, D. Cui","doi":"10.1109/AICIT55386.2022.9930321","DOIUrl":"https://doi.org/10.1109/AICIT55386.2022.9930321","url":null,"abstract":"In order to improve the selectivity and quickness of generator out-of-step protection, a method of generator out-of-step protection based on support vector machine (SVM) for intelligent trajectory recognition is presented. Firstly, the motion feature is extracted from the measured impedance trajectory at the generator terminal, and the extracted feature sequence is calculated with statistical parameters to form 140-dimensional features. Secondly, the principal component analysis method is used to reduce the dimension of the feature to form the corresponding training input feature space, and the particle swarm algorithm is used to optimize the parameters of SVM. Finally, the simulation samples verify that the method can accurately identify the out-of-step oscillations. Compared with traditional out-of-step protection, this method improves the reliability and speed of generator out-of-step protection.","PeriodicalId":231070,"journal":{"name":"2022 International Conference on Artificial Intelligence and Computer Information Technology (AICIT)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132323667","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Lianying Zou, Tao Yuan, Xinli Cao, Yang Zhang, Wenjie Liao
{"title":"Design of Infant Gait Monitoring System Based on FPGA","authors":"Lianying Zou, Tao Yuan, Xinli Cao, Yang Zhang, Wenjie Liao","doi":"10.1109/AICIT55386.2022.9930189","DOIUrl":"https://doi.org/10.1109/AICIT55386.2022.9930189","url":null,"abstract":"In recent years, the incidence of abnormal leg types such as foot internal rotation, foot external rotation, partial flat foot and O-shaped leg is very high among teenagers and children in China, which has a serious impact on the growth of teenagers. Gait monitoring system is used to detect whether children’s walking posture is correct or not. Because of its good portability, low cost and accurate measurement, it is widely used in the medical field. This paper designs a gait monitoring system for young children based on domestic FPGA, which is designed by Chinese. The 32-bit SOC architecture with Cotex-M3 as the core is used as the controller. The gait information is obtained through mpu6050 sensor, and then the controller calculates and processes the collected data. The data calculated by attitude angle is uploaded to the cloud platform through WIFI module. After obtaining the data, the upper computer displays the angle offset value. At the same time, when the measurement angle is higher or lower than the set threshold, the system alarm device will be triggered. The hardware structure of the system is simplified, which can meet the high-speed data transmission work, and provides a more stable and accurate reference standard for attitude information.","PeriodicalId":231070,"journal":{"name":"2022 International Conference on Artificial Intelligence and Computer Information Technology (AICIT)","volume":"112 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132544583","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Maritime Object Detection based on YOLOx for Aviation Image","authors":"Yuan-bo Wang, Haiwen Yuan, Yongshuai Li, Bulin Zhang","doi":"10.1109/AICIT55386.2022.9930259","DOIUrl":"https://doi.org/10.1109/AICIT55386.2022.9930259","url":null,"abstract":"Accurate detection of ships in maritime scenarios is conducive to improving transport efficiency and reducing the occurrence of maritime traffic accidents. However, ships under the drone perspective are small and have various scale variations, affecting the detection algorithms. Aiming at this problem, this paper proposes a maritime object detection method based on YOLOx. First, the ship data in the maritime scenario is processed and screened to form a self-built dataset. Then, the retrained YOLOx model is used to detect ships in maritime scenarios. Finally, on the self-built dataset, CenterNet, YOLOv3, and YOLOv4 are used to conduct a comparative experiment with this method. Through the results of the comparative experiments, it is found that the detection accuracy of YOLOx is the best, reaching 90.86%. The method helps to promote the development of the application of drones in maritime scenarios.","PeriodicalId":231070,"journal":{"name":"2022 International Conference on Artificial Intelligence and Computer Information Technology (AICIT)","volume":"14 5","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113984436","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Cheng W. Wang, Jiakuan Gao, Xin Dang, Long Wu, Bo Liu, C. Shao
{"title":"Simulation and Analysis of Water Hammer Effect in Water Pipeline","authors":"Cheng W. Wang, Jiakuan Gao, Xin Dang, Long Wu, Bo Liu, C. Shao","doi":"10.1109/AICIT55386.2022.9930192","DOIUrl":"https://doi.org/10.1109/AICIT55386.2022.9930192","url":null,"abstract":"Due to the fast conveying speed of water or other liquids, when the valve is suddenly opened or closed, it is easy to present water hammer effect. The existence of water hammer problem can easily lead to accidents such as pipeline bursting or pipeline collapse, which not only affects the safety of the transportation process, but also interferes with normal production causing economic losses. This paper will analyze the principle of water hammer effect and determine the wave speed of water hammer by solving the basic differential equation of water hammer and combining the calculation results. Use SOLIDWORKS software to establish models of water pipelines and valves, and use FLUENT software to simulate and simulate the water pipelines and valves. Through two observation points, the changes in the pressure and fluid flow rate in the water pipeline are observed to analyze the effect of water hammer on the water pipeline.","PeriodicalId":231070,"journal":{"name":"2022 International Conference on Artificial Intelligence and Computer Information Technology (AICIT)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123751369","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}