H. Yong, Suo Jun, Z. Qiang, Zhu Liang, Wang Chuanxiu
{"title":"Control Strategy of Grid Connected Photovoltaic Power with Energy Storage System","authors":"H. Yong, Suo Jun, Z. Qiang, Zhu Liang, Wang Chuanxiu","doi":"10.1109/ITNEC48623.2020.9085029","DOIUrl":"https://doi.org/10.1109/ITNEC48623.2020.9085029","url":null,"abstract":"Due to the fluctuation of photovoltaic power generation caused by the change of light intensity and temperature, an energy storage photovoltaic grid connected power generation system is proposed to suppress the fluctuation of grid connected power. Based on the maximum power tracking and grid connected inverter control of photovoltaic power generation, the battery energy storage system is introduced. The system not only has the function of maximum power tracking and grid connected power generation, but also has the function of generating power and stabilizing. In the matla simulation environment, the simulation model of the whole system is established. The simulation results show that the control method proposed in this paper is feasible and effective.","PeriodicalId":235524,"journal":{"name":"2020 IEEE 4th Information Technology, Networking, Electronic and Automation Control Conference (ITNEC)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124011858","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Zhenye Gan, Jiaolong Jiang, Guangying Zhao, Yajing Yan
{"title":"Mandarin-Tibetan Bilingual Cross-language Voice Conversion Based on Semi-hidden Markov Model","authors":"Zhenye Gan, Jiaolong Jiang, Guangying Zhao, Yajing Yan","doi":"10.1109/ITNEC48623.2020.9084692","DOIUrl":"https://doi.org/10.1109/ITNEC48623.2020.9084692","url":null,"abstract":"In recent years, deep learning based voice conversion (VC) has significantly improved the performance of the conversion system. However, such systems generally require a large amount of parallel corpus from the source speakers and the target speaker, and the parallel corpus of Mandarin-Tibetan bilingual is difficult to obtain. In order to solve this problem, we propose a method based on the semi-hidden Markov model (HSMM) using Mandarin-Tibetan bilingual average voice model and speaker adaptive technology for VC. This method does not require parallel corpus. Firstly, it obtains the Mandarin-Tibetan bilingual average voice model using mixed language multi-speaker corpus training, then uses a small number of source speaker corpora to adaptively convert the average voice model to obtain the speaker-related acoustic model. Finally, the text corresponding to the source speaker's speech is translated, and the context-dependent labels of the translated text is input into the speaker-related acoustic model, the converted speech is output to realize cross-language VC. The experimental results show the effectiveness of this method, the converted speech MOS score: 3.37 points; DMOS score: 3.00 points.","PeriodicalId":235524,"journal":{"name":"2020 IEEE 4th Information Technology, Networking, Electronic and Automation Control Conference (ITNEC)","volume":"10 11","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120920062","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Cluster Autoscaler Based on Multiple Node Types in Kubernetes","authors":"Mingming Wang, Dongmei Zhang, Bin Wu","doi":"10.1109/ITNEC48623.2020.9084706","DOIUrl":"https://doi.org/10.1109/ITNEC48623.2020.9084706","url":null,"abstract":"Kubernetes, as a production-grade container orchestration system, has been used in varieties of fields on a large scale. However, as used more and more widely, the appropriate selection of auto scaling schemes in kubernetes also faces considerable challenges in their respective application fields. Based on multiple node types with image pre-loaded, this paper proposes an improved automatic scaling scheme that combines the advantages of different types of nodes in the scaling process. The results show that, compared with the default auto scaler, it can improve the performance of the system under rapid load pressure and reduce the instability within the running clusters.","PeriodicalId":235524,"journal":{"name":"2020 IEEE 4th Information Technology, Networking, Electronic and Automation Control Conference (ITNEC)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121395300","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design of a Cloud Storage Security Encryption Algorithm for Power Bidding System","authors":"Ding ManJiang, Cao Kai, Wang Zengxi, Zhu Lipeng","doi":"10.1109/ITNEC48623.2020.9085095","DOIUrl":"https://doi.org/10.1109/ITNEC48623.2020.9085095","url":null,"abstract":"To solve the problem of poor security and performance caused by traditional encryption algorithm in the cloud data storage of power bidding system, we proposes a hybrid encryption method based on symmetric encryption and asymmetric encryption. In this method, firstly, the plaintext upload file is divided into several blocks according to the proportion, then the large file block is encrypted by symmetrical encryption algorithm AES to ensure the encryption performance, and then the small file block and AES key are encrypted by asymmetric encryption algorithm ECC to ensure the file encryption strength and the security of key transmission. Finally, the ciphertext file is generated and stored in the cloud storage environment to prevent sensitive files Pieces from being stolen and destroyed. The experimental results show that the hybrid encryption method can improve the anti-attack ability of cloud storage files, ensure the security of file storage, and have high efficiency of file upload and download.","PeriodicalId":235524,"journal":{"name":"2020 IEEE 4th Information Technology, Networking, Electronic and Automation Control Conference (ITNEC)","volume":"95 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114236354","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Zhibin Du, Lu Zhang, Shuai Zhao, Quanshan Hou, Yang Zhai
{"title":"Research on Test and Evaluation Method of L3 Intelligent Vehicle Based on Chinese Characteristics Scene","authors":"Zhibin Du, Lu Zhang, Shuai Zhao, Quanshan Hou, Yang Zhai","doi":"10.1109/ITNEC48623.2020.9084746","DOIUrl":"https://doi.org/10.1109/ITNEC48623.2020.9084746","url":null,"abstract":"With the development of autonomous driving technology, the L3 intelligent and connected vehicle gradually takes the vector production stage, and test verification is an essential part to measure its functionality. There is no relevant guidance method at present. Based on the natural driving scene database of China Automotive Technology and Research Center, this paper uses LGBM decision tree model to extract the typical features of the scene, and outputs the final high complexity scene according to the weight of each tree. At the same time, combined with CIDAS accident scene and parameter recombination scenario, this paper proposes a kind of scene design method and evaluation method for L3 intelligent vehicle function test. Finally, the verification is carried out on the intelligent and connected vehicle VIL test platform. The results show that the method has good consistency with the actual vehicle test results.","PeriodicalId":235524,"journal":{"name":"2020 IEEE 4th Information Technology, Networking, Electronic and Automation Control Conference (ITNEC)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114366007","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Application of Master Data Classification Model in Enterprises","authors":"Yi Liu, Haibo Liu, Fan Yang, Xiaolong Chen","doi":"10.1109/ITNEC48623.2020.9085080","DOIUrl":"https://doi.org/10.1109/ITNEC48623.2020.9085080","url":null,"abstract":"Master data construction is at the core of the enterprise information strategy, and it is the collection place of data to ensure the consistency and uniqueness of the target system data. In this paper, the identification indicators are determined from the characteristics of master data. The indicator weight is based on the business importance, so as to construct the master data identification score system. According to the data survey and census results, identify the master data and clarify the scope of master data attributes, and finally build the business owner master data model, which lay a good foundation for later data governance.","PeriodicalId":235524,"journal":{"name":"2020 IEEE 4th Information Technology, Networking, Electronic and Automation Control Conference (ITNEC)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116294057","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Attention-Aware Network and Multi-Loss Joint Training Method for Vehicle Re-Identification","authors":"Hui Zhou, Chen Li, Lipei Zhang, Wei Song","doi":"10.1109/ITNEC48623.2020.9085181","DOIUrl":"https://doi.org/10.1109/ITNEC48623.2020.9085181","url":null,"abstract":"Vehicle ReID is a core technology in Intelligent Traffic System (ITS) and an important branch of ReID problem. However, due to the complexity of the traffic environment, the dataset commonly has serious imbalances between positive and negative sample data. To conquer these issues, a novel effective CNN is proposed in this paper. Firstly, we present an Attention-Aware Network that combines the Spatial Attention Model with the Channel Attention Model to make the network focus on high importance areas and further improve the ability to identify matching vehicles. Besides, we propose the Multi-Loss Joint Training strategy to handling the data imbalances. Then to prove the effectiveness of our proposed method. We evaluated our network on the most popular VeRi-776 dataset. Abundant experiment results have shown the effectiveness of our proposed method in vehicle re-identification compared with existing method.","PeriodicalId":235524,"journal":{"name":"2020 IEEE 4th Information Technology, Networking, Electronic and Automation Control Conference (ITNEC)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124305918","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"License plate location method based on edge detection and mathematical morphology","authors":"Haibo Lin, Jianli Zhao, Shuaiyi Li, Guang Qiu","doi":"10.1109/ITNEC48623.2020.9085121","DOIUrl":"https://doi.org/10.1109/ITNEC48623.2020.9085121","url":null,"abstract":"The license plate location plays a key role in the license plate recognition system. The quality of the positioning result determines the subsequent license plate character recognition. For the image based on edge detection, it is difficult to detect the license plate area for the discoloration or serious pollution of the license plate. Therefore, a license plate location method based on edge detection and mathematical morphology is proposed. Firstly, the image preprocessing of the license plate includes graying and binarization. Then, the Sobel operator edge detection is performed according to the binarized license plate image. The Sobel operator has moderate sensitivity to the edge and is suitable for the extraction of the license plate edge. Finally, On the result of Sobel operator processing, the mathematical morphology of corrosion, expansion, opening and closing operations are performed to obtain the final license plate location.","PeriodicalId":235524,"journal":{"name":"2020 IEEE 4th Information Technology, Networking, Electronic and Automation Control Conference (ITNEC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124332671","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analysis of Dual-server Polling Access Control Protocol","authors":"Zhijun Yang, Lei Mao, H. Ding","doi":"10.1109/ITNEC48623.2020.9084958","DOIUrl":"https://doi.org/10.1109/ITNEC48623.2020.9084958","url":null,"abstract":"In the era of mobile Internet, the amount of data is increasing explosively, and high-performance hardware devices can no longer meet the needs of data processing. In order to solve the problem of the limiting load capacity of single-server polling mechanism and the network congestion phenomenon, a dual-server polling access MAC control protocol is proposed. The protocol is composed of N sites and two servers. The servers provide services for each site according to the exhaustive service policy. When the two servers are scheduled, the synchronous mode and the asynchronous mode are adopted respectively. In the process of analysis, the basic theory of the polling system and the method of probability generating function are introduced to analyze the characteristics of average queue length and average delay of the synchronization mode, which are verified by simulation experiments. For the asynchronous mode, because the relative motion of the server is more complex, it is studied by computer simulation. The experimental results show that the dual-server polling access mechanism is less affected by the load, and the average delay and the average queue length of the number of information packets are smaller. Under the same load, its performance is much better than the single-server model.","PeriodicalId":235524,"journal":{"name":"2020 IEEE 4th Information Technology, Networking, Electronic and Automation Control Conference (ITNEC)","volume":"114 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124076541","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design of Temperature and Humidity Detection System for a Material Warehouse Based on GM","authors":"Haibing Yuan, Ziping Wang, L. Xia","doi":"10.1109/ITNEC48623.2020.9085141","DOIUrl":"https://doi.org/10.1109/ITNEC48623.2020.9085141","url":null,"abstract":"In view of the measurement and control of temperature and humidity in the material warehouse of a factory, the Internet of things scheme is adopted, ESP8266 chip is used to connect WiFi, temperature and humidity sensor DHT11 is used to collect temperature and humidity, the collected temperature and humidity data is connected to Baidu intelligent cloud server through MQTT protocol, and the collected temperature and humidity data is sent to WeChat and stored in cloud through topic subscription and release of Baidu intelligent cloud According to, and at the same time use gray prediction model to predict the temperature and humidity data of the warehouse, through the WeChat end, you can view the current and predicted temperature and humidity data of the warehouse. The design of the measurement and control system is convenient and effective for real-time detection and prediction of the temperature and humidity data of the material warehouse. The system has the advantages of small size, low deployment cost and so on.","PeriodicalId":235524,"journal":{"name":"2020 IEEE 4th Information Technology, Networking, Electronic and Automation Control Conference (ITNEC)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124223594","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}