2020 IEEE 4th Information Technology, Networking, Electronic and Automation Control Conference (ITNEC)最新文献

筛选
英文 中文
Compensation Point Configuration Method of Static Var Generator Based on Clustering Algorithm 基于聚类算法的静态无功发电机补偿点配置方法
Guoliang Feng, Xingong Cheng, X. Zong
{"title":"Compensation Point Configuration Method of Static Var Generator Based on Clustering Algorithm","authors":"Guoliang Feng, Xingong Cheng, X. Zong","doi":"10.1109/ITNEC48623.2020.9085034","DOIUrl":"https://doi.org/10.1109/ITNEC48623.2020.9085034","url":null,"abstract":"In three-phase unbalanced management, static var generator (SVG) can be used as a current source to compensate unbalanced load and reduce three-phase unbalanced node voltage. Reasonable configuration of SVG compensation points can not only improve the governance effect of three-phase imbalance, but also reduce the investment cost. Aiming at the problem of reasonable configuration of SVG compensation points, this paper proposes a negative sequence current based clustering algorithm to determine SVG compensation points, and establishes a mathematical model to solve the compensation capacity of SVG with the objective of negative sequence voltage, network loss and minimum investment cost. The feasibility and economy of the proposed method are verified by IEEE33-bus simulation.","PeriodicalId":235524,"journal":{"name":"2020 IEEE 4th Information Technology, Networking, Electronic and Automation Control Conference (ITNEC)","volume":"2 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113937670","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Joint Active User Identification and Multiuser Detection in DS-CDMA Cellular Communication Network DS-CDMA蜂窝通信网络中联合主动用户识别与多用户检测
Kenan Zhang, G. Tu, Yuanfang Xie, Lei Hou, Can Zhang
{"title":"Joint Active User Identification and Multiuser Detection in DS-CDMA Cellular Communication Network","authors":"Kenan Zhang, G. Tu, Yuanfang Xie, Lei Hou, Can Zhang","doi":"10.1109/ITNEC48623.2020.9085023","DOIUrl":"https://doi.org/10.1109/ITNEC48623.2020.9085023","url":null,"abstract":"In cellular communication network, users are allowed to enter or leave the network arbitrarily. Hence, the number, identities and transmitted data of active users vary with time and have considerable impacts on the receiver's performance. The so-called problem of active user identification, which consists of determining the number and identities of active users, is usually solved prior to the problem of multiuser detection which means detecting the data transmitted by active users. Traditional methods implement the two parts separately with a two-stage decoder. In this paper we propose a Maximum A posteriori Probability (MAP) based method, which uses BCJR algorithm to execute active user identification and multiuser detection jointly. Simulation results show that the proposed method outperforms previous methods in detecting the number and identities of active users and data transmitted by active users.","PeriodicalId":235524,"journal":{"name":"2020 IEEE 4th Information Technology, Networking, Electronic and Automation Control Conference (ITNEC)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121389353","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Crowd-sourcing user participant recruitment method based on geo-social network 基于地理社会网络的众包用户参与者招募方法
Yong Cheng, Tong Wang, Liang Wang
{"title":"Crowd-sourcing user participant recruitment method based on geo-social network","authors":"Yong Cheng, Tong Wang, Liang Wang","doi":"10.1109/ITNEC48623.2020.9085174","DOIUrl":"https://doi.org/10.1109/ITNEC48623.2020.9085174","url":null,"abstract":"Crowd-sourcing is a way of spreading tasks to different executive groups to solve a large number of tasks with group power. How to quickly collect a large number of executors is one of the main research problems of Crowd-sourcing task distribution. In this paper, a social network-oriented crowd-sourcing task information propagation method is adopted, which applies mobile behavior preference and information interaction among users to the task distribution process of swarm perception, accelerates the task information propagation process, and realizes more accurate and efficient task recommendation and assignment. Thesis research contents: one is the user interest preferences mobile behavior, social network analysis, the second is combined with the physical, social dual space Crowd-sourcing task information propagation, third is the use of optimized algorithm to choose the best collection of workers, and has been conducted on real data sets, the results show that paper method on the premise of guarantee the task completion promoted the rapid spread of task efficiently and high reliability, reasonable resource calls.","PeriodicalId":235524,"journal":{"name":"2020 IEEE 4th Information Technology, Networking, Electronic and Automation Control Conference (ITNEC)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125205521","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Deep Highway Multi-Camera Vehicle Re-ID with Tracking Context 深度公路多摄像头车辆重新识别跟踪上下文
Xiangdi Liu, Yunlong Dong, Zelin Deng
{"title":"Deep Highway Multi-Camera Vehicle Re-ID with Tracking Context","authors":"Xiangdi Liu, Yunlong Dong, Zelin Deng","doi":"10.1109/ITNEC48623.2020.9085008","DOIUrl":"https://doi.org/10.1109/ITNEC48623.2020.9085008","url":null,"abstract":"While object detection and re-identification has become increasingly popular in computer version, The growing explosion in the use of surveillance cameras on highway highlights the importance of intelligent surveillance.multi-camera vehicle Tracking, aiming to seek out all images of vehicle of interest in different cameras, can provide abundant information such as vehicle movement for highway supervision department. This paper focus on a interesting but challenging problem, building a real-time highway vehicle tracking framework. We design a two-stage deep learning-based algorithm framework, including vehicle detection and vehicle re-identification. Vehicle re-identification is the most significant part in this tracking framework, however, the most existing methods for vehicle Re-ID focus on the appearance or texture of single vehicle image and achieve limited performance. In this paper, we propose a novel deep learning-based network named VTC (Vehicle Tracking Context) to extract features from vehicle tracking context. Extensive experimental results demonstrate the effectiveness of our method, furthermore, intelligent surveillance system based on proposed tracking framework has been successfully use in Beijing-Hong Kong-Macao Expressway.","PeriodicalId":235524,"journal":{"name":"2020 IEEE 4th Information Technology, Networking, Electronic and Automation Control Conference (ITNEC)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125328281","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Design of Moving Object Detection Algorithm Based on Computer Vision 基于计算机视觉的运动目标检测算法设计
Haile Zhen, G. Wu, Zhijun Wang
{"title":"Design of Moving Object Detection Algorithm Based on Computer Vision","authors":"Haile Zhen, G. Wu, Zhijun Wang","doi":"10.1109/ITNEC48623.2020.9084913","DOIUrl":"https://doi.org/10.1109/ITNEC48623.2020.9084913","url":null,"abstract":"Image recognition technology of computer vision is one of the hotspots in the research field. The target detection and recognition technology is becoming mature. On the basis of this technology, a moving target capture algorithm with simple and fast operation, resource saving and high potential value is designed. Real-time monitoring is carried out for the object tracking of shell trail. A moving object detection algorithm based on static background was designed and the definition of target image was optimized. Because of the moving target image is not clear, wavelet transform was used to remove noise and wiener filter restoration method was used to remove fuzzy shadows to make the image clear. An appropriate threshold value was selected by image threshold segmentation, and the target was extracted from the background image by differential image binarization. Finally, morphological corrosion and Hough transform are used to calculate the location of moving targets, so as to detect the target of moving shells in the environment, and capture the track of moving target on this basis, which provide a basis for the next step of visual servo control.","PeriodicalId":235524,"journal":{"name":"2020 IEEE 4th Information Technology, Networking, Electronic and Automation Control Conference (ITNEC)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127556928","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Ceiling Priority for Synchronous Communication in Real-Time Systems 实时系统中同步通信的上限优先级
Junghwan Lee, Myungjun Kim
{"title":"Ceiling Priority for Synchronous Communication in Real-Time Systems","authors":"Junghwan Lee, Myungjun Kim","doi":"10.1109/ITNEC48623.2020.9084783","DOIUrl":"https://doi.org/10.1109/ITNEC48623.2020.9084783","url":null,"abstract":"Software complexity has increased in real-time systems such as automotive electronic control units (ECUs), as many functions are required for such systems. As software complexity has increased, component-based development has been broadly used to decouple software components for reusability, modifiability, and extensibility. Synchronous communication is frequently used between components in component-based development such as AUTomotive Open System ARchitecture (AUTOSAR). Previous studies on scheduling algorithms did not investigate the blocking and priority inversion problem in synchronous communication between tasks. We have observed that synchronous communication has same problem with resources sharing such as critical sections and semaphores, which have been investigated in many studies. The priority inversion also exists in synchronous communication between tasks since all consumer tasks communicating with the same provider tasks must wait until the provider tasks respond. We propose Ceiling Priority for Synchronous Communication (CPSC) for priority assignment and schedulability analysis based on rate-monotonic scheduling. The proposed algorithm was used for automotive battery management system (BMS) based on AUTOSAR and a multiprocessor in multi-criticality real-time systems.","PeriodicalId":235524,"journal":{"name":"2020 IEEE 4th Information Technology, Networking, Electronic and Automation Control Conference (ITNEC)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122872476","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Research and application of key technologies for B/S man-machine interface B/S人机界面关键技术的研究与应用
Yan Lv, Yuanyuan Li, Xiaolin Qi, Yi Han
{"title":"Research and application of key technologies for B/S man-machine interface","authors":"Yan Lv, Yuanyuan Li, Xiaolin Qi, Yi Han","doi":"10.1109/ITNEC48623.2020.9085210","DOIUrl":"https://doi.org/10.1109/ITNEC48623.2020.9085210","url":null,"abstract":"A B/S (browser/server) human-machine interface architecture of separate front-end and back-end is proposed. The micro-services architecture is used to develop the services in the service layer. The standardized service publishing/discovery mechanism, uniform format for message data encapsulation and message subscription theme are implemented to support multiple applications. A new CIM/G graphics conversion method is illustrated which can convert CIM/G graphics to SVG graphics and provide more information for better graphics display. The real-time data push method based on WebSocket is designed to realize pushing multiple graphics data with single WebSocket connection. The B/S human-machine interface has been running stably for more than half a year, compared with the traditional human-machine interface, it can display graphics data in a faster and more efficient way to fulfil requirements of application data display.","PeriodicalId":235524,"journal":{"name":"2020 IEEE 4th Information Technology, Networking, Electronic and Automation Control Conference (ITNEC)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122878345","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Implementation of an Image Compression Algorithm Based on Low Complexity Integer Approximate Discrete Tchebichef Transform 基于低复杂度整数近似离散切切夫变换的图像压缩算法的实现
Wang Yuting, L. Xuedong, Hu Zaijun
{"title":"Implementation of an Image Compression Algorithm Based on Low Complexity Integer Approximate Discrete Tchebichef Transform","authors":"Wang Yuting, L. Xuedong, Hu Zaijun","doi":"10.1109/ITNEC48623.2020.9085123","DOIUrl":"https://doi.org/10.1109/ITNEC48623.2020.9085123","url":null,"abstract":"The discrete cosine transform (DCT) is used widely in the area of image compression. Recently, the Discrete Tchebichef Transform (DTT) is reported to be superior to DCT in terms of coding performance. In this paper, DTT is presented first. Then a scheme of deriving the integer approximate DTT is introduced. The integer approximate DTT is used to compress a gray-scale image. Since the resulting integer approximate DTT matrix is not normal, we need to multiply a diagonal matrix to its left. When we use the integer matrix to perform the transform, the diagonal matrix have to be merged into the quantization process. We derive the equivalent quantization matrix and the inverse quantization matrix. Compared with JPEG and exact DTT, the integer approximated DTT shows a bit lower reconstructed image quality but with extreme low complexity.","PeriodicalId":235524,"journal":{"name":"2020 IEEE 4th Information Technology, Networking, Electronic and Automation Control Conference (ITNEC)","volume":"112 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131516690","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Intelligent Fault Severity Diagnosis Method based on Hybrid Ordinal Classification 基于混合有序分类的故障严重程度智能诊断方法
Weiwei Pan, Huixin He
{"title":"An Intelligent Fault Severity Diagnosis Method based on Hybrid Ordinal Classification","authors":"Weiwei Pan, Huixin He","doi":"10.1109/ITNEC48623.2020.9084970","DOIUrl":"https://doi.org/10.1109/ITNEC48623.2020.9084970","url":null,"abstract":"Feature selection and classification are widely used in fault diagnosis. In fault severity diagnosis, different fault severity can be expressed as normal, slight, moderate and severe. And some fault features monotonically change with the severity. How to use the potential ordinal information in the data is the key to the accuracy of diagnosis. Considering the existence of ordinal information, this paper presents an intelligent method for fault severity diagnosis based on ordinal classification. Furthermore, this paper discusses the method of optimal division of monotonic and non-monotonic features. First, we apply a feature selection algorithm to obtain an optimal feature subset. Then, we train a diagnosis model by using the partially monotonic decision tree (PMDT). Then, the proposed model is applied to classify different crack levels of the gear. Experimental results demonstrate that the proposed diagnosis method can reduce the feature size and improve performance of fault severity diagnosis.","PeriodicalId":235524,"journal":{"name":"2020 IEEE 4th Information Technology, Networking, Electronic and Automation Control Conference (ITNEC)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127668605","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Attack Path Generation Methods Based on Graph Database 一种基于图数据库的攻击路径生成方法
Bintao Yuan, Zulie Pan, Fan Shi, Zhenhan Li
{"title":"An Attack Path Generation Methods Based on Graph Database","authors":"Bintao Yuan, Zulie Pan, Fan Shi, Zhenhan Li","doi":"10.1109/ITNEC48623.2020.9085039","DOIUrl":"https://doi.org/10.1109/ITNEC48623.2020.9085039","url":null,"abstract":"With the popularity of network technology and the expansion of network scale, the network security risks are increasingly serious. Network vulnerability assessment methods, a technology of active network security defense, have attracted many researchers. Most existing network vulnerability assessment methods store different types of data in different ways, which makes querying and analyzing inefficient, especially in the complex large-scale network environment. In order to solve this problem, this paper proposes a method of network vulnerability assessment based on graph database. The network host information, association relationship between hosts and vulnerability information of the target network are stored in the graph database, the query and analysis are carried out by using the graph database query language. Graph database stores the information of the network hosts, association relationship among hosts and vulnerabilities of the target network. The graph database query language supports querying and analysis. Visualizing the network topology, vulnerability information and all possible attack paths provides a reference to develop the network security protection strategy. Experiments' results illustrate that the method runs efficiently and helps with querying and analysis, which is applicable to large-scale complex network environment.","PeriodicalId":235524,"journal":{"name":"2020 IEEE 4th Information Technology, Networking, Electronic and Automation Control Conference (ITNEC)","volume":"222 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132718092","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信