Song Qibing, Z. Ling, Jiang Huiying, Shao Yichuan, L. Jiayang, Chen Yun
{"title":"Technology of Cross System User Access Control in New Generation Power Grid Dispatching and Control System","authors":"Song Qibing, Z. Ling, Jiang Huiying, Shao Yichuan, L. Jiayang, Chen Yun","doi":"10.1109/ICPICS55264.2022.9873556","DOIUrl":"https://doi.org/10.1109/ICPICS55264.2022.9873556","url":null,"abstract":"This article analyzes the changes of the new generation power grid dispatching control system in system architecture, clarifies the requirements of cross system user access control, elaborates authorization strategy based on dual subject of user and dispatching agency, token-based cross system access control strategy, cross identity authentication center token verification and caching strategy. Finally verified the feasibility of the solution based on the environment of the new generation power grid dispatching control system at dispatching agency of East China, Jiangsu and Shanghai.","PeriodicalId":257180,"journal":{"name":"2022 IEEE 4th International Conference on Power, Intelligent Computing and Systems (ICPICS)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133577723","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Skin Lesion Classification based on Deep Convolutional Neural Network","authors":"Youteng Wu, Agyenta Charity Lariba, Haotian Chen, Haiyan Zhao","doi":"10.1109/ICPICS55264.2022.9873756","DOIUrl":"https://doi.org/10.1109/ICPICS55264.2022.9873756","url":null,"abstract":"Skin cancer is one of the most common cancers, and its early detection has a huge impact on its outcomes. In this paper, the deep convolutional neural network is improved with the idea of transfer learning to classify 7 types of skin lesions that are from ISIC 2017 HAM10000 dataset. First, the skin lesion images are trained with a 3-layer convolutional neural network after preprocessing. Then for InceptionV3, ResNet50 and DenseNet201, remove the output layer of each original network, add new pooling layer and full connection layers to different networks respectively. After that, combine some of the convolution layers and pooling layers with the new pooling and full connection layers to form three new improved models, based on the original deep conventional networks. Finally, the training parameters which are from ImageNet network are fine-tuned on new improved InceptionV3, ResNet50 and DenseNet201 to finish the classification. The experimental images' size is 224* 224, and the experiments turn out that three improved networks get better results, and the improved ResNet50 gets the best which accuracy is 86.69%. Its accuracy is 3% higher than the comparable other methods.","PeriodicalId":257180,"journal":{"name":"2022 IEEE 4th International Conference on Power, Intelligent Computing and Systems (ICPICS)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132792552","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on Identity Authentication of IoT Devices based on Blockchain","authors":"Mingong Chen, Mingming Qin, Yuxiang Huang, Zhihong Liang, Tiancheng Liu, Cong Zhong","doi":"10.1109/ICPICS55264.2022.9873707","DOIUrl":"https://doi.org/10.1109/ICPICS55264.2022.9873707","url":null,"abstract":"Identity authentication is one of the methods to protect the security of devices in the Internet of Things. In view of the security and privacy protection problems caused by identity authentication in traditional centralized platforms, this paper combines the blockchain technology with the existing authentication model of the Internet of Things. Firstly, the authentication strategy is formulated according to the attributes of the IoT device; secondly, the use of cryptography technology to ensure transmission security, so as to ensure the data transmission security, reliability and authenticity of the Internet of Things, and realize the transmission security, network security and data security of The Internet of Things devices; finally, the model anti-attack ability is tested and analyzed from the aspects of performance and security.","PeriodicalId":257180,"journal":{"name":"2022 IEEE 4th International Conference on Power, Intelligent Computing and Systems (ICPICS)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133514543","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Novel Detection Method for Three Date Marks of Industrial Product based on Machine Vision","authors":"Qiying Ren, Zhipeng Wang","doi":"10.1109/ICPICS55264.2022.9873557","DOIUrl":"https://doi.org/10.1109/ICPICS55264.2022.9873557","url":null,"abstract":"In this paper, a novel identify scheme for Three Date Marks(TDMS) based on delayed residual method is proposed. First of all, two images with delay are acquired by a machine vision detection system, and a residual character image is obtained through delayed residual method. Then, a feature extraction kernel is designed according to the size of characters to strengthen the strokes. In addition, the speckle noise is well removed using designed corrosion and dilation. And we modified the median filter to improve the recognition performance of the proposed method. Finally, we developed a complete visual detection system to implement the proposed method. The extensive experimental results indicate that proposed identify scheme has high recognition rate and detection efficiency, and can fully meet the application requirements of the real-time industrial production lines.","PeriodicalId":257180,"journal":{"name":"2022 IEEE 4th International Conference on Power, Intelligent Computing and Systems (ICPICS)","volume":"88 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131804485","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Fei Chen, Hao Cao, Chengjie Zheng, Xu Ma, Jianjun Hu
{"title":"Identification of Torsional Dynamic Parameters of Turbine Generator based on Hilbert Transformation","authors":"Fei Chen, Hao Cao, Chengjie Zheng, Xu Ma, Jianjun Hu","doi":"10.1109/ICPICS55264.2022.9873576","DOIUrl":"https://doi.org/10.1109/ICPICS55264.2022.9873576","url":null,"abstract":"An experimental method is proposed to identify torsional dynamic parameters from the measured impulse torsional response signals of turbine generator. Five-point cubic smoothing method is used to denoise the impact response signal. The envelope of the response signal is extracted by Hilbert transformation. The torsional natural frequency is calculated from the instantaneous phase signal. The envelope is fitted linearly in logarithmic coordinates. The torsional damping ratio and impact response amplitude are extracted. The torsional impulse response of a 600 MW supercritical turbine generator unit under three-phase short circuit fault is simulated. The torsional parameters are extracted by the method. The identification accuracy of damping ratio and natural frequency is high. It can be used to identify torsional parameters. The larger the amplitude of torsional response, the higher the identification accuracy. The measurement points should be arranged near the maximum deformation point of the modal to be identified.","PeriodicalId":257180,"journal":{"name":"2022 IEEE 4th International Conference on Power, Intelligent Computing and Systems (ICPICS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133684341","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An optimization ant colony algorithm based on fixed point theory","authors":"Xiaodi Huang, Ya Han, Zhongfeng Hu","doi":"10.1109/ICPICS55264.2022.9873586","DOIUrl":"https://doi.org/10.1109/ICPICS55264.2022.9873586","url":null,"abstract":"the convergence accuracy and stability of ant colony optimization algorithm (ACO) are in urgent need of improvement ever since it has been proposed. Existing research attempt to optimize the algorithm from various perspectives, but most of them are relatively ex prate or application specific. In this paper, we design an elite strategy to optimize the initial parameters and build a Fixed-point ACO improved algorithm. The process is that it first converts the problem of targeted function optimization to a problem of fixed-point searching. Then the solution of the equation set is obtained by simplicial algorithm (SA) of fixed-point theory. Finally, the solution set will be regarded as the initial population of ACO algorithm and the remaining parameters are set accordingly. The experimental study is carried with five testing functions from UCI database. The results indicate that FP-ACO algorithm is significantly better than the conventional algorithm both on the average speed of convergence and the average accuracy of global optimum. Besides, the searching process of FP-ACO algorithm has a better stability by presenting a state of continuous optimization.","PeriodicalId":257180,"journal":{"name":"2022 IEEE 4th International Conference on Power, Intelligent Computing and Systems (ICPICS)","volume":"102 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115326479","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Li Wei, Wang Dayang, Cai Hao, Jiang Song, Li Pei, Jiang Chunxia
{"title":"A Method of Constellation Design based on PSO for 5G LEO Satellite Communication System","authors":"Li Wei, Wang Dayang, Cai Hao, Jiang Song, Li Pei, Jiang Chunxia","doi":"10.1109/ICPICS55264.2022.9873599","DOIUrl":"https://doi.org/10.1109/ICPICS55264.2022.9873599","url":null,"abstract":"The wireless satellite communication system is considered to be the most promising new communication method to achieve the coverage of heaven, earth and sea. Satellite constellation design is the most important stage before the actual deployment of satellites. It will determine the number of satellites and orbit related parameters. We aim to study the constellation design of 5G low-orbit satellites. At present, some advanced research results have been proposed, providing important theory and experience for in-depth exploration and improvement of satellite constellation structure. We proposed a method based on the multi-objective particle swarm optimization (PSO) algorithm for designing low-orbit 5G satellite constellation. The method takes the number of satellites and orbit related parameters as the limit, and take the coverage of a specific area as the objective function. The results showed that the PSO algorithm can meet the full-time and full-area coverage low-orbit 5G constellation design for a specific area, and verified the effectiveness of the PSO algorithm for the coverage low-orbit 5G constellation design for the target area. We provided satellite constellation coverage guarantee for link-level simulation of 5g LEO satellite communication system in the next step.","PeriodicalId":257180,"journal":{"name":"2022 IEEE 4th International Conference on Power, Intelligent Computing and Systems (ICPICS)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115620649","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An end-to-end intelligent monitoring system based on pinpoint","authors":"Lanying Shi, Huan Liang, Wensheng Yao, Jingxiang Chen, Chunhua Chen, Yong Chen, Chen-Jei Yang, Mengxia Chen, Yiquan Jiang, Jiangang Tong, Man Li, Hongming Qiao","doi":"10.1109/ICPICS55264.2022.9873689","DOIUrl":"https://doi.org/10.1109/ICPICS55264.2022.9873689","url":null,"abstract":"with the wide implementation of distributed architecture, it brings new challenges to operation and maintenance. The number of system nodes and microservices increased exponentially, and the monitoring workload increased sharply. The relationship between monitoring objects is extremely complex, and human maintenance is not competent. The traditional maintenance mode is difficult to sustain due to data fragmentation and remote storage. Traditional operation and maintenance has the following shortcomings: 1) Due to the group / provincial two-level maintenance system, the operation and maintenance is decentralized. As a result, the whole network business support cannot be effectively controlled, and the whole network problem / fault scheduling system is not smooth. 2) The whole network monitoring system is built according to different businesses, with scattered monitoring data and backward monitoring methods, which leads to the difficulty of position problem across businesses. 3) Traditional maintenance is oriented to single system and single business, without focusing on end-to-end customer perception. 4) Single system cross domain or layer problem / fault processing is slow and time-consuming, and can not achieve accurate fault location and rapid fault recovery. This paper proposes an end-to-end intelligent monitoring system based on pinpoint. It is an intensive operation and maintenance platform for cloud systems, which can realize cross domain monitoring and cross IaaS/PaaS/SaaS layer monitoring. It is a shared operation and maintenance platform based on big data and AI technology to establish platform/application architecture. As for service, it can provide end-to-end cross service monitoring throughout the network. As for application, it can be used for the whole network to quickly find and locate faults. After using the end-to-end distributed cloud monitoring system, the fault discovery time is greatly shortened, and the fault handling is reduced from hour level to minute level. At the same time, the system fault time is greatly shortened, and the operation and maintenance efficiency is improved.","PeriodicalId":257180,"journal":{"name":"2022 IEEE 4th International Conference on Power, Intelligent Computing and Systems (ICPICS)","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121567230","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Kedong Zhu, Yaping Li, Xiaorui Guo, Jiantao Liu, G. Wang
{"title":"Day-ahead holiday load forecast based on pattern sequence similarity and random forest","authors":"Kedong Zhu, Yaping Li, Xiaorui Guo, Jiantao Liu, G. Wang","doi":"10.1109/ICPICS55264.2022.9873588","DOIUrl":"https://doi.org/10.1109/ICPICS55264.2022.9873588","url":null,"abstract":"To solve the holiday load forecasting, a novel day-ahead holiday load forecast is proposed by means of pattern sequence similarity and random forest. The prediction for holiday load can be splitted into daily per-unit curve and daily power external value. The prediction for daily per-unit curve is conducted by pattern sequence similarity while daily power external value is predicted by random forest. Then, the above two prediction results synthesis the holiday load with segment correction. It can be found that this methodology is suitable in holiday STLF problem.","PeriodicalId":257180,"journal":{"name":"2022 IEEE 4th International Conference on Power, Intelligent Computing and Systems (ICPICS)","volume":"97 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124289280","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Wang Dayang, Cai Hao, Shuming Yi, Jiang Song, Jiang Chunxia, Wu Xilao
{"title":"Intelligent Scheduling of Business and Traffic in Power Communication Network based on SDN","authors":"Wang Dayang, Cai Hao, Shuming Yi, Jiang Song, Jiang Chunxia, Wu Xilao","doi":"10.1109/ICPICS55264.2022.9873536","DOIUrl":"https://doi.org/10.1109/ICPICS55264.2022.9873536","url":null,"abstract":"The cloud computing and big data businesses are growing rapidly, which brings serious challenges on easing network congestion. Meanwhile, the power industry is upgrading the power network to energy network, which also introduces plenty of new types of businesses with requirements on deterministic transmission and flexibly grouping network. Software defined network (SDN) technologies seperating the data plane and control plane of traditional network architecture, improves the efficiency of managing network resource and allows to re-config the structure of local network. Based on the SDN technologies, this paper proposes an intelligent scheduling system for businesses and traffics in the power communication network. Firstly, this paper presents some practical applications that are suffering from some challenges, and shows that introducing SDN into the application is able to improve the performance. The intelligent scheduling system is described in detail as well. Some important functions are expected, such as network virtualization, business scheduling, SDN network configuration and maintenance, etc. Meanwhile, the relationship crossing the multiple levels of intelligent scheduling system is explained. The SDN controllers could manage the corresponding physical network, and build VLans according to the business requirements and network resource distribution. Then some important data flow is transferred to scheduling system by the north interface of SDN controllers. This paper also clarifies the positive effects while applying SDN technologies and the intelligent scheduling system into power network by three practical scenarios, including establishing businesses, adjusting network bandwidth, and QoS-based network service management.","PeriodicalId":257180,"journal":{"name":"2022 IEEE 4th International Conference on Power, Intelligent Computing and Systems (ICPICS)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125582884","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}