{"title":"Research on Integrated Electronically Controlled Two-gear Main Reducer Used in Baja Racing Car","authors":"Junan Kong, Dunfeng Qin, Haoyang Dong","doi":"10.1109/ipec54454.2022.9777501","DOIUrl":"https://doi.org/10.1109/ipec54454.2022.9777501","url":null,"abstract":"Baja racing car, as an off-road vehicle for competition, has higher requirements for the quality of the vehicle itself. In order to ensure the lightweight and power performance, at the same time, vigorously improve the passability of Baja racing cars in the cross-country field, a main reducer in the power transmission system is designed in this paper. According to the different driving conditions, the servo motor can be used to change the gear of the main reducer. at the same time, the differential can be locked according to the need. The main reducer designed in this project can greatly improve the power performance and adaptability to the terrain of the racing car. on the one hand, automatic shift can improve fuel efficiency and increase the safety of the whole vehicle. At the same time, the single-chip microcomputer system is used to control the gear servo motor to improve the life of the reducer. Under the background of lightweight racing car, we integrate the two-stage two-speed reducer, differential and differential lock with more complex structure, which greatly improves the space utilization. At the same time, the functions of shift and locking are creatively controlled by a motor, which is not only lightweight, but also more reliable and economical.","PeriodicalId":232563,"journal":{"name":"2022 IEEE Asia-Pacific Conference on Image Processing, Electronics and Computers (IPEC)","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132741243","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Microgrid multi-energy system considering distributed energy storage and multi-scenario dynamic electricity price coordination run optimization","authors":"Yue Yu, Yun Teng","doi":"10.1109/IPEC54454.2022.9777369","DOIUrl":"https://doi.org/10.1109/IPEC54454.2022.9777369","url":null,"abstract":"In view of the traditional time-of-use tariff can not meet the optimization needs of distribution network, this paper proposes a scheduling operation strategy considering the cooperative optimization of distributed energy storage and dynamic electricity price, and defines the dynamic electricity price in multiple scenarios. Based on the analysis of the different effects of distributed energy storage on the distribution network in the multi-energy system of micro-grid, a multi-objective function is constructed to minimize the loss and voltage deviationof distribution network. The results verify the efficiency of operation optimization strategy in improving energy utilization and power efficiency.","PeriodicalId":232563,"journal":{"name":"2022 IEEE Asia-Pacific Conference on Image Processing, Electronics and Computers (IPEC)","volume":"101 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131900814","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Multi-objective Integrated Management of Engineering Project Based on Genetic Hybrid Optimization Algorithm","authors":"Qiuyun Wang","doi":"10.1109/ipec54454.2022.9777342","DOIUrl":"https://doi.org/10.1109/ipec54454.2022.9777342","url":null,"abstract":"Under the background of the rapid development of computer network technology, the algorithm used in engineering is also making continuous progress. The multi-objective integrated management of engineering projects must adapt to the pace of development of The Times, and constantly improve the optimization algorithm, so that the algorithm can serve the field of engineering projects. The optimization and improvement of algorithm are of great significance to engineering project management, especially multi-objective integrated management of engineering project. It is necessary to strengthen the research of genetic hybrid optimization algorithm for engineering project development. This article studied the genetic hybrid optimization algorithm based on the study of the multi-objective integrated project management, is introduced to define genetic hybrid optimization algorithm, principle of multi-objective project related theory and knowledge, etc., by using functional analysis method based on genetic hybrid optimization algorithm of the multi-objective integrated project management effect comparison, Compare the advantages of genetic hybrid optimization algorithm. This paper uses data to analyze the effect of engineering projects, which has significant advantages in many aspects of multi-objective integrated management of engineering projects. Through data testing, the comprehensive evaluation rate of engineering projects reaches 89.12%, 90.23%, 95.32%, 98.10% respectively.","PeriodicalId":232563,"journal":{"name":"2022 IEEE Asia-Pacific Conference on Image Processing, Electronics and Computers (IPEC)","volume":"100 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134474746","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Fire behavior of a low smoke halogen-free cable arranged by the triangular laying method","authors":"Yin Li, Jian Wang, Xuehui Wang","doi":"10.1109/IPEC54454.2022.9777480","DOIUrl":"https://doi.org/10.1109/IPEC54454.2022.9777480","url":null,"abstract":"The presented study deals with the fire risk of electrical cables arranged by the triangular laying method. The ignition time and heat release rate of a low smoke halogen-free cable were investigated using the cone calorimeter. The experimental results revealed the combustion characteristics of the cable under different thermal radiation and provided data reference for the cable installation.","PeriodicalId":232563,"journal":{"name":"2022 IEEE Asia-Pacific Conference on Image Processing, Electronics and Computers (IPEC)","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115408126","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Human Resource Database Management Based on Apriori Algorithm","authors":"Fuzhang Tian","doi":"10.1109/ipec54454.2022.9777457","DOIUrl":"https://doi.org/10.1109/ipec54454.2022.9777457","url":null,"abstract":"In the current Internet development environment, database technology came into being and has been applied quickly and efficiently. This paper provides a design method to help organization management based on the principle of Apriori algorithm. Firstly, the system extracts association rules and task models from the data structure, and then generates a decision table by reasonably allocating user information, analyzing and processing it, so as to realize the effective classification of massive large files. Finally, the database connection function is completed in combination with the transaction diagram and specific use cases, and finally an efficient and reliable human resources database is formed. At the same time, the performance of the database is tested. This experiment tests their load capacity, running capacity and resource utilization from five modules. As can be seen from the figure, the performance of these five modules meets the system operation requirements.","PeriodicalId":232563,"journal":{"name":"2022 IEEE Asia-Pacific Conference on Image Processing, Electronics and Computers (IPEC)","volume":"179 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123285537","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Security Transmission Design Based on Concatenated LT and LDPC Codes","authors":"Ruijia Yuan, Tianjiao Xie, Jianhua Zhang","doi":"10.1109/IPEC54454.2022.9777547","DOIUrl":"https://doi.org/10.1109/IPEC54454.2022.9777547","url":null,"abstract":"Aiming at the problem of security transmission in the space-terrestrial integrated networks, this paper proposes a physical layer secure transmission architecture based on concatenated LT and LDPC Codes. The outer code LT code adopts real-time random sampling coding, which can form a complex random interconnection structure and fully expand the randomness. The inner code LDPC code generates different codes through the random change of cyclic shift vector, Reduce the node interconnection deterioration caused by randomization on soft decision decoding, and obtain weak randomness high-performance error correction coding through storage optimized high-performance check matrix combined with soft decision decoding. The analysis and simulation results show that the proposed security transmission method not only improves the security of transmission, but also maintains the high transmission efficiency. Therefore it can be applied to the field of secure communication.","PeriodicalId":232563,"journal":{"name":"2022 IEEE Asia-Pacific Conference on Image Processing, Electronics and Computers (IPEC)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122982428","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on Mathematical Statistics Model Algorithm under Improved Algorithm","authors":"Huajian Feng, Benjun Ge, Zhitao Zhang","doi":"10.1109/IPEC54454.2022.9777373","DOIUrl":"https://doi.org/10.1109/IPEC54454.2022.9777373","url":null,"abstract":"The current evolutionary algorithms for solving multi-objective optimization mainly consider how to deal with the optimization of multiple conflicting objectives, and rarely consider the problem of processing constraints. Therefore, we propose a differential evolution algorithm for elite retention and non-dominated solution set migration operations in the evolution process to ensure the diversity of Pareto optimal solutions for multi-objective optimization problems. The performance of the basic differential evolution algorithm is improved through group chaotic initialization, adaptive crossover and mutation operations. The simulation results of three classic test functions show that the algorithm in this paper is better than the non-dominated sorting genetic algorithm in terms of uniformity, approximation and convergence speed, and the convergence speed is also better than the other two improved evolutionary algorithms.","PeriodicalId":232563,"journal":{"name":"2022 IEEE Asia-Pacific Conference on Image Processing, Electronics and Computers (IPEC)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123722948","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design of Campus Network Security System Based on Network Information Security","authors":"Jifang Zhang","doi":"10.1109/IPEC54454.2022.9777499","DOIUrl":"https://doi.org/10.1109/IPEC54454.2022.9777499","url":null,"abstract":"Network information security has been elevated to a national strategy and has become a powerful driving force for innovation and development. While the campus network is developing rapidly, due to the openness and sharing nature of the Internet technology, it still leaves shortcomings in the protection against illegal intrusion and attacks. With the subsequent increase in hacking techniques and the emergence of a wide range of network attack tools, the use of firewalls alone is no longer sufficient to deal with network attacks and to ensure effective protection of sensitive data. Research on the security system of campus network, propose a security system structure with longitudinal anti-attack capability and diversified defence means, adopt measures of application security, physical security, system security, network security and management security, etc. to enhance the ability of campus network to resist attacks and serve the teaching and research work of universities in all aspects.","PeriodicalId":232563,"journal":{"name":"2022 IEEE Asia-Pacific Conference on Image Processing, Electronics and Computers (IPEC)","volume":"138 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122136215","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on College English Teaching Evaluation System Based on Data Mining Technology","authors":"Lim Henan","doi":"10.1109/IPEC54454.2022.9777402","DOIUrl":"https://doi.org/10.1109/IPEC54454.2022.9777402","url":null,"abstract":"with the vigorous advancement of information technology in the Internet age, various industries have been greatly affected, and the trend of combining Internet models with multiple industries is being promoted gradually. Therefore, connecting the Internet and education has slowly become popular, and data mining technology plays a central role in this process. Data mining technology analyzes the Internet information generated by students in class, extracts relevant features, and explores the relationship between students' performance in college English classrooms and the various classroom elements. At first, this article summarizes data mining and college English teaching at home and abroad. On this basis, the scenes of the students in the college English classroom are imagined, the students' habits are modeled to establish the evaluation system of college English class.","PeriodicalId":232563,"journal":{"name":"2022 IEEE Asia-Pacific Conference on Image Processing, Electronics and Computers (IPEC)","volume":" 46","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113952741","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on Computer Network Security Algorithm Based on Boyer Intrusion Detection","authors":"Xiaoning Su","doi":"10.1109/ipec54454.2022.9777439","DOIUrl":"https://doi.org/10.1109/ipec54454.2022.9777439","url":null,"abstract":"Computer network security is an important protection means for the safe use of data and information. Aiming at the efficiency of Boyer algorithm for intrusion detection, this paper makes a new improvement on the matching detection rules. According to a specific preset array, the two characters are combined according to the principle of adjacent grouping, and then the intrusion detection is completed by minimizing the maximum moving distance. The experimental results show that the improved imboyer algorithm has shorter time and higher efficiency.","PeriodicalId":232563,"journal":{"name":"2022 IEEE Asia-Pacific Conference on Image Processing, Electronics and Computers (IPEC)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122783571","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}