{"title":"Single Current Feedback Control for LCL Grid-connected Inverter Based on Tracking Differentiator","authors":"Dazhi Liu, X. Zong, Xingong Cheng, Chunlei Dai","doi":"10.1109/ITNEC48623.2020.9084749","DOIUrl":"https://doi.org/10.1109/ITNEC48623.2020.9084749","url":null,"abstract":"LCL filter is widely used in grid-connected inverter system. Compared with $L$ filter, it has good attenuation effect on high harmonics. However, LCL filter is a third-order system with low damping, and is very easy to resonate. Active damping is an effective measure to solve the resonance problem of LCL filter. The traditional grid-connected current feedback active damping is difficult to extract differential signals, poor dynamic performance and poor noise suppression. Therefore, single current feedback control strategy for LCL grid-connected inverter based on tracking differentiator is proposed in this paper. The third-order tracking differentiator (TD) is designed to extract the second-order differential signal of the grid-connected current as the feedback control of active damping in order to suppress the resonance and the noise. As a result, performance of the dynamic response when the grid-connected current is suddenly changed and the noise suppression are improved. Simulation results demonstrate the effectiveness of the proposed method.","PeriodicalId":235524,"journal":{"name":"2020 IEEE 4th Information Technology, Networking, Electronic and Automation Control Conference (ITNEC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129790694","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Fast Spectral Clustering algorithm based on wavelet basis decomposition","authors":"Bobo Lian, Hong Chen, Chenjian Wu, Minxin Chen","doi":"10.1109/ITNEC48623.2020.9084950","DOIUrl":"https://doi.org/10.1109/ITNEC48623.2020.9084950","url":null,"abstract":"Spectral clustering is a widely used unsupervised clustering algorithm that performs very well in many cases. However, for complex scenes and high-resolution images, the application is limited due to the high computational complexity. In this paper, we propose an efficient spectral clustering algorithm based on wavelet basis decomposition. According to the hierarchical structure of wavelet decomposition, the algorithm reduces the dimension of the eigendecomposition of the graph Laplacian by wavelet basis matrix, the low-frequency eigenvectors of the whole graph Laplacian are solved hierarchically from wavelet subspaces with different levels. Its computational complexity is $O(n) + O(m3/2)$, where $n$ and m. are the number of pixels and selected wavelet coefficients in an image, respectively. To verify the effectiveness and performance of the proposed algorithm, a series of experiments were done on both the Weizmann and BSDS500 segmentation datasets and find that our method, which in practice provides on average about 5 × speed-up to the eigendecomposition computation required for the Laplacian matrix with comparable segmentation accuracy.","PeriodicalId":235524,"journal":{"name":"2020 IEEE 4th Information Technology, Networking, Electronic and Automation Control Conference (ITNEC)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129842304","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Network Covert Timing Channel Detection Method Based on Chaos Theory and Threshold Secret Sharing","authors":"Jinpu Xie, Yonghong Chen, Linfan Wang, Zhe Wang","doi":"10.1109/ITNEC48623.2020.9085024","DOIUrl":"https://doi.org/10.1109/ITNEC48623.2020.9085024","url":null,"abstract":"Network covert timing channel(NCTC) is a process of transmitting hidden information by means of inter-packet delay (IPD) of legitimate network traffic. Their ability to evade traditional security policies makes NCTCs a grave security concern. However, a robust method that can be used to detect a large number of NCTCs is missing. In this paper, a NCTC detection method based on chaos theory and threshold secret sharing is proposed. Our method uses chaos theory to reconstruct a high-dimensional phase space from one-dimensional time series and extract the unique and stable channel traits. Then, a channel identifier is constructed using the secret reconstruction strategy from threshold secret sharing to realize the mapping of the channel features to channel identifiers. Experimental results show that the approach can detect varieties of NCTCs with a guaranteed true positive rate and greatly improve the versatility and robustness.","PeriodicalId":235524,"journal":{"name":"2020 IEEE 4th Information Technology, Networking, Electronic and Automation Control Conference (ITNEC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130169178","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Parts Classification based on PSO-BP","authors":"Bo Wei, Lei Hu, Ya-nan Zhang, Yi Zhang","doi":"10.1109/ITNEC48623.2020.9084709","DOIUrl":"https://doi.org/10.1109/ITNEC48623.2020.9084709","url":null,"abstract":"Aiming at the problems of low accuracy and low efficiency of the traditional parts classification method, and the strong nonlinear mapping relationship between the feature parameters of parts and the types of parts, this paper proposes a parts classification and recognition method based on particle swarm optimization (pso) and BP neural network (bp). Firstly, the acquired part image is preprocessed to extract image features such as affine invariant moment, circularity and rectangularity. The image feature parameters and the corresponding part categories constitute the data set through PSO-BP training, and then different kinds of parts are identified by the trained classifier. Compared with the BP neural network classification, the particle swarm optimization BP neural network classification is not easy to fall into the local minimum solution, and the classification and recognition accuracy is higher. The experimental results show that this method has higher classification and recognition accuracy in the process of parts sorting.","PeriodicalId":235524,"journal":{"name":"2020 IEEE 4th Information Technology, Networking, Electronic and Automation Control Conference (ITNEC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131085617","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design and Implementation of TSIP Interface Driver Based on FPGA","authors":"Hao Chen, Zhibin Zeng","doi":"10.1109/ITNEC48623.2020.9085040","DOIUrl":"https://doi.org/10.1109/ITNEC48623.2020.9085040","url":null,"abstract":"TSIP is a multi-link serial interface suitable for providing external data transmission for multi-core DSPs. Based on the in-depth research on the TSIP interface protocol standard, this paper uses TMS320C66778 multi-core DSP as an example to design and implement the TSIP protocol interface driver between FPGA and DSP. The front end of the system is a preprocessing module implemented by FPGA, which processes the incoming sampling data from external A / D to make it meet the requirements of TSIP link transmission. The back-end DSP program mainly implements the interface function of TSIP. Provides low-latency, high-reliability data transmission for DSP signal processing.","PeriodicalId":235524,"journal":{"name":"2020 IEEE 4th Information Technology, Networking, Electronic and Automation Control Conference (ITNEC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130752320","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Detection Mechanism Against DDoS Attacks based on Convolutional Neural Network in SINET","authors":"Wenqian Jia, Ying Liu, Yi Liu, Jiushuang Wang","doi":"10.1109/ITNEC48623.2020.9084918","DOIUrl":"https://doi.org/10.1109/ITNEC48623.2020.9084918","url":null,"abstract":"From DoS (Distributed Denial of Service) to DDoS (Distributed Denial of Service), DoS attacks have always been an important threat to network security. In Smart Identifier network, resource adaption resolution server is vulnerable to single point failures due to DDoS attacks, which may leads to the paralysis of the whole network, thus it is particularly important to detect DDoS attacks against it. This paper proposes a detection mechanism against DDoS attacks for resource adaptation resolution server. Firstly, we locate suspicious connections according to the characteristics of DDoS attacks and then migrate the connections to the backup server. The backup server is equipped with a convolutional neural network, which can accurately determine whether the traffic on the suspicious connections is attack traffic or not. The simulation results show that the detection mechanism can effectively detect whether a DDoS attack occurs on a certain connection, migrate suspicious connections, and alleviate the pressure of network and ensure its normal operation.","PeriodicalId":235524,"journal":{"name":"2020 IEEE 4th Information Technology, Networking, Electronic and Automation Control Conference (ITNEC)","volume":"17 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132462135","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Image extrapolation based on multi-column convolutional attention network","authors":"Xiaofeng Zhang, Songsong Wu, Hao Ding, Zuoyong Li","doi":"10.1109/ITNEC48623.2020.9084753","DOIUrl":"https://doi.org/10.1109/ITNEC48623.2020.9084753","url":null,"abstract":"Image inpainting is based on the generation of branches against the network. Many recent methods of deep learning have shown great progress in challenging tasks that repair large numbers of missing areas in the map. These methods can be visually restored to a reasonable image and structure, but still produce a distorted structure or a fuzzy structure that is different in the surrounding area. In the past year, image expansion has begun to slowly enter our field of vision. Previous research based on mathematical methods started to get noticed, but the challenge of extrapolating this work is very huge, so we propose multi-column convolution. The attention network is trained to produce a blank gap in the image, and the depth learning method of image expansion is very promising and proved to be feasible.","PeriodicalId":235524,"journal":{"name":"2020 IEEE 4th Information Technology, Networking, Electronic and Automation Control Conference (ITNEC)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130600843","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Simulation Research on New Model of Air-to-Air Missile Attack Zone","authors":"Aiguo Li, Yanan Meng, Zongkang He","doi":"10.1109/ITNEC48623.2020.9084793","DOIUrl":"https://doi.org/10.1109/ITNEC48623.2020.9084793","url":null,"abstract":"The air-to-air missile attack zone is the key indicator for measuring air-to-air missile weapon systems. In the traditional air-to-air missile attack zone model, only when our aircraft is in the same line with the target, the missile can hit the target. The missile off-axis angle is added to make the missile hit the target at a certain angle. Firstly, the dichotomy is used to search for the boundary of the near-infrared attack zone. Secondly, the fourth-order Runge-Kutta method is used to calculate the missile trajectory to determine whether the hit condition is met. Finally, the boundary of the attack zone that satisfies the condition is calculated. The experimental simulation results show that the target entry angle is 0 degrees to 360 degrees, and the missile off-axis angle is between 0–30 degrees. When the missile off-axis angle is larger, the target entry angle is between 45 degrees and 150 degrees. The scope of the missile attack zone becomes smaller, and the range of the attack zone between 240 degrees and 360 degrees becomes larger. Simulation experiments show that even if our aircraft and the target are not in the same line, we can launch missiles, which has great application value for the pilot to decide whether to launch missile hit targets.","PeriodicalId":235524,"journal":{"name":"2020 IEEE 4th Information Technology, Networking, Electronic and Automation Control Conference (ITNEC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130444983","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
X. Gong, Qingbo Mao, Chuangang Wang, Bo Jiang, Haixiang Sun, Zhixin Wang
{"title":"Analysis of abnormal short circuit between turns of generator rotor windings","authors":"X. Gong, Qingbo Mao, Chuangang Wang, Bo Jiang, Haixiang Sun, Zhixin Wang","doi":"10.1109/ITNEC48623.2020.9084807","DOIUrl":"https://doi.org/10.1109/ITNEC48623.2020.9084807","url":null,"abstract":"In December 2018, during the normal operation of the NO.1 generator in a power plant, the online monitoring device of interturn-to-turn short circuit of the rotor #5 coil showed a suspected interturn-to-turn short circuit phenomenon. Check the rotor voltage, current, vibration and other data, are not found abnormal. The monitoring results of the on-line monitoring device for inter-turn short circuit in rotor of NO.1 generator show that there is some abnormal situation in NO.5 coil. After checking the test reports of RSO, ac impedance and power loss of generator rotor, no abnormal data was found. The correlation between the vibration of the rotor and the reactive power and the excitation current was checked. In addition, the rotor vibration of NO.1 generator does not increase during operation. It is suggested that the relationship between the vibration and the reactive power and the excitation current of the rotor rotor should be monitored, and the correlation analysis should be done.","PeriodicalId":235524,"journal":{"name":"2020 IEEE 4th Information Technology, Networking, Electronic and Automation Control Conference (ITNEC)","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131718899","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Solving Production Scheduling Problem of Automotive Parts Workshop Based on Improved Genetic Algorithm","authors":"Qi Xu, Tao Huang, Jing Li, Yilei Yang","doi":"10.1109/ITNEC48623.2020.9084704","DOIUrl":"https://doi.org/10.1109/ITNEC48623.2020.9084704","url":null,"abstract":"At present, many production companies have problems such as long non-processing time of production lines, difficulty in scheduling of each station, and low utilization of production resources. This article takes the production data of auto parts after-sales company as an example, puts forward the production resource scheduling problem of the flexible parts workshop of auto parts, and uses and improves the genetic algorithm to solve the problem. The two coding methods two-dimensional matrix-based machine coding and the machine process segmented coding are compared. The evolution reversal operation was added to improve the local search ability of the genetic algorithm, so that each generation of the algorithm can inherit more genes from the parent. This paper uses MATLAB to process the data and simulate the scheduling results, which proves the feasibility and effectiveness of the algorithm.","PeriodicalId":235524,"journal":{"name":"2020 IEEE 4th Information Technology, Networking, Electronic and Automation Control Conference (ITNEC)","volume":"28 9","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131721753","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}