Zengdong Jia, Yong Yang, Lianjun Duan, Lei Liu, Mingmao Hu
{"title":"Research on Key Technologies of high power DC charging module","authors":"Zengdong Jia, Yong Yang, Lianjun Duan, Lei Liu, Mingmao Hu","doi":"10.1109/IAEAC54830.2022.9930064","DOIUrl":"https://doi.org/10.1109/IAEAC54830.2022.9930064","url":null,"abstract":"This paper mainly studies a high-power DC charging module with output voltage range of DC 200V to DC 1000V, and can realize constant power 40kW output in the range of DC 300V to DC 1000V, which realizes the advantages of high efficiency, high power factor and high power density, meets the high-voltage platform electric vehicle and supports the development route of “Chaoji” fast charging. This paper mainly studies the hardware topology platform of high-power ultra wide voltage range and ultra wide constant power DC charging converter and the software control strategy platform of high-power DC charging converter.","PeriodicalId":349113,"journal":{"name":"2022 IEEE 6th Advanced Information Technology, Electronic and Automation Control Conference (IAEAC )","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130869448","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Xianqiong Yao, Zhong Gan, Yilong Chen, Lei Guo, Wei Wang
{"title":"Hybrid Flow Scheduling with Additional Simple Compensation Mechanisms in Time-Sensitive Networks","authors":"Xianqiong Yao, Zhong Gan, Yilong Chen, Lei Guo, Wei Wang","doi":"10.1109/IAEAC54830.2022.9929463","DOIUrl":"https://doi.org/10.1109/IAEAC54830.2022.9929463","url":null,"abstract":"With the increasing of distributed energy resources, in order to ensure system security and flexibility, the same switching device must support the mixed transmission of multiple streams. Therefore, the mechanism of hybrid streaming is urgently needed. The IEEE Time-Sensitive Networking (TSN) Task Force is working to standardize key mechanisms to enable simultaneous coexistence of time-sensitive and non-time-sensitive flows in Ethernet. In this paper, we propose a hybrid traffic scheduling mechanism for HFSM-C. This mechanism combines TAS with CQF, and utilizes flow ordering, injection slot adjustment and the simple compensation mechanism proposed in this paper to schedule time-sensitive flow and large-bandwidth flow respectively. Through experiments, we found that the HFSM-C mechanism significantly improves the schedule-ability compared with other mechanisms, and under the same TSN system settings, it schedules more flows than the HSTC mechanism, the FITS mechanism and the Tabu-ITP mechanism when scheduling large-bandwidth flows, the success rate is higher, and the efficient scheduling of mixed flows is realized.","PeriodicalId":349113,"journal":{"name":"2022 IEEE 6th Advanced Information Technology, Electronic and Automation Control Conference (IAEAC )","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128930345","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Efficiency Study of SSAG on RNN Framework","authors":"Xiaowei Xie, Aixiang Chen","doi":"10.1109/IAEAC54830.2022.9929855","DOIUrl":"https://doi.org/10.1109/IAEAC54830.2022.9929855","url":null,"abstract":"SGD (Stochastic gradient descent) is widely used in deep learning, however SGD cannot get linear convergence and is not effective in large amounts of data. This paper use SSAG to improve the efficiency. SSAG contains two optimization strategies, one is stratified sampling strategy and the other is historical gradient averaging strategy. It has the advantages of fast convergence of variance, flexible application to big data, and easy work in deep network. This paper studies the efficiency of SSAG gradient optimization algorithm based on RNN framework. The proposed RNN framework comprises a feature extraction layer, a stacked RNN layer, and a transcription layer. The experimental results confirm that the accuracy of SSAG is better than the SGD and the Momentum. Both stratified sampling and historical averaging strategies have the effect of improving task accuracy. Experimental results verified that SSAG has better effect in image classification task.","PeriodicalId":349113,"journal":{"name":"2022 IEEE 6th Advanced Information Technology, Electronic and Automation Control Conference (IAEAC )","volume":"156 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122455501","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Chuyue Wang, Meiling Wang, Wenfeng Zhan, Xiaodong Ye
{"title":"Algorithm Research Based on 2D LiDAR-Binocular Camera Fusion","authors":"Chuyue Wang, Meiling Wang, Wenfeng Zhan, Xiaodong Ye","doi":"10.1109/IAEAC54830.2022.9929493","DOIUrl":"https://doi.org/10.1109/IAEAC54830.2022.9929493","url":null,"abstract":"Autonomous navigation algorithms for mobile robots are widely used. At present, the mainstream civil indoor mobile robot autonomous navigation algorithms are using low cost 2D LiDAR, which obtains less environmental information. In this paper, a lower-cost binocular camera and 2D LiDAR are used as sensors to obtain more environmental information. Firstly, the binocular camera is calibrated and fitted with depth error. Secondly, the 3D information of the binocular camera is intercepted and projected to obtain two-bit point cloud data. Finally, the processed 2D camera point cloud data is fitted with the LiDAR point cloud for interpolation, and the fused 2D point cloud is obtained for autonomous robot navigation. The experimental verification can determine that this algorithm has significantly improved the autonomous navigation effect compared to using 2D LiDAR alone.","PeriodicalId":349113,"journal":{"name":"2022 IEEE 6th Advanced Information Technology, Electronic and Automation Control Conference (IAEAC )","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122271782","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"FDTD Algorithm for Bistatic RCS Prediction of 3-D Target on two GPUs","authors":"Pengfei Wang, Haifu Zhang","doi":"10.1109/IAEAC54830.2022.9929994","DOIUrl":"https://doi.org/10.1109/IAEAC54830.2022.9929994","url":null,"abstract":"As a numerical algorithm, the finite-difference time domain (FDTD) is effective in solving electromagnetic scattering problem of medium with high complexity. The computional efficiency is low by the traditional central processing unit (CPU) platform. Therefore, the GPU-based FDTD method used to speed up its computational efficiency for bistatic RCS prediction of 3-D object is realized in this paper. Both the validation and efficiency of our implemen is verified by comparison of parallel result versus CPU's. A speedup of about 38x is realized on two NVIDIA K40 GPUs, which improves the computational efficiency. The results also show that the computional efficiency of the parallel method is related to the number of Yee cells.","PeriodicalId":349113,"journal":{"name":"2022 IEEE 6th Advanced Information Technology, Electronic and Automation Control Conference (IAEAC )","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126001583","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on Personal Privacy Security Detection Technology for Android Application","authors":"Wang Chao, Dong Jiahan, Wang Xiaohu, Ren Tianyu","doi":"10.1109/IAEAC54830.2022.9930036","DOIUrl":"https://doi.org/10.1109/IAEAC54830.2022.9930036","url":null,"abstract":"With the intensive release and implementation of relevant laws, regulations and standards on personal information protection, mobile APP, as the key application carrier and entrance and exit of personal information, has attracted more and more attention from government regulators and the public. In order to improve the accuracy of security detection of personal privacy violation in Android Apps, an APP sensitive privacy behavior detection method based on Frida hook monitoring was proposed. The method calls the system function interface through Frida hook APP to intercept and monitor the access to sensitive privacy data such as external storage, address book, SMS and geographical location, and construct the APP sensitive behavior access list. Combined with the application type, comprehensively analyze the permission list and sensitive behavior list to judge whether the APP has the problem of collecting personal privacy information beyond the scope. By selecting common mobile APPs such as audio-visual, online games and social chat, the verification test is carried out. The personal privacy security detection method can find the violation problems of the notified APP, which has certain practicality.","PeriodicalId":349113,"journal":{"name":"2022 IEEE 6th Advanced Information Technology, Electronic and Automation Control Conference (IAEAC )","volume":"93 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125275651","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Zebin Jiang, Ke Zhang, Kuijun Wu, Jie Xu, Xinyan Li, Yu Sun, Xianliang Ge, Ming Mao
{"title":"Mental workload recognition using ECG and machine learning in simulated flight tasks","authors":"Zebin Jiang, Ke Zhang, Kuijun Wu, Jie Xu, Xinyan Li, Yu Sun, Xianliang Ge, Ming Mao","doi":"10.1109/IAEAC54830.2022.9930029","DOIUrl":"https://doi.org/10.1109/IAEAC54830.2022.9930029","url":null,"abstract":"Effective mental workload recognition is of great significance for improving task performance and reducing accidents. Although prior research has achieved approximately 95% accuracy using electroencephalography (EEG), it is difficult to transplant into actual task scenarios due to the low portability of the device. Here, we introduce a mental workload recognition solution to give consideration to high recognition accuracy and portability. Heart rate variability (HRV) was extracted from the electrocardiogram (ECG) signals of 26 participants during simulated flight tasks, and the sensitive features were screened out using the generalized linear mixed model. Then, the three mental workload levels were classified and evaluated in combination with the machine learning method. Our solution achieved an accuracy of 98% for subject-independent mental workload recognition.","PeriodicalId":349113,"journal":{"name":"2022 IEEE 6th Advanced Information Technology, Electronic and Automation Control Conference (IAEAC )","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125449259","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cable Tension Measurement System Based on Lora Module","authors":"Liangbo Li, Hairong Wang, Fangfang Lu, Shenglan Gu, Li Li, Kaixiang Guo","doi":"10.1109/IAEAC54830.2022.9929664","DOIUrl":"https://doi.org/10.1109/IAEAC54830.2022.9929664","url":null,"abstract":"Considering that the static tension on the cable will change in real-time due to factors such as waves, subsurface currents, and wind loads when the deep-sea anchor towing machine performs towing operations, and the excessive load of the cable will endanger the safety of the towing machine and even the whole ship, and it is necessary to accurately measure the cable. The static tension is monitored and displayed online so that safety measures such as emergency release can be taken at a time when the cable load exceeds the limit. In this paper, the sensor data is sent to the cable tension measurement system through the LoRa wireless network, and the tension data is monitored in real-time, which can avoid cable breakage and ensure safety.","PeriodicalId":349113,"journal":{"name":"2022 IEEE 6th Advanced Information Technology, Electronic and Automation Control Conference (IAEAC )","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125476727","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"IEEE 6th Advanced Information Technology, Electronic and Automation Control Conference","authors":"","doi":"10.1109/iaeac54830.2022.9929804","DOIUrl":"https://doi.org/10.1109/iaeac54830.2022.9929804","url":null,"abstract":"","PeriodicalId":349113,"journal":{"name":"2022 IEEE 6th Advanced Information Technology, Electronic and Automation Control Conference (IAEAC )","volume":"115 5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129040804","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jiafeng Wang, Ming Liu, Xiaokang Yin, Yuhao Zhao, Shengli Liu
{"title":"Semi-supervised Malicious Traffic Detection with Improved Wasserstein Generative Adversarial Network with Gradient Penalty","authors":"Jiafeng Wang, Ming Liu, Xiaokang Yin, Yuhao Zhao, Shengli Liu","doi":"10.1109/IAEAC54830.2022.9929762","DOIUrl":"https://doi.org/10.1109/IAEAC54830.2022.9929762","url":null,"abstract":"With the development of artificial intelligence, malicious traffic detection technology based on deep learning has become mainstream with its powerful detection performance. Most existing deep learning-based detection methods require sufficient labeled data to train classifiers. But much labeled traffic is difficult to obtain in practical applications. To solve this problem, we propose and implement a semi-supervised malicious traffic detection method based on improved Wasserstein Generative Adversarial Network with Gradient Penalized (WGAN-GP), denoted as SEMI-WGAN-GP. First, we construct a pseudo- feature map (PFM) for each stream in the dataset using the time-series properties of consecutive packets in a given stream. Second, we fix the generator and only train the discriminator on a few labeled PFMs, which obtain a discriminator that can distinguish malicious from benign traffic. Finally, the generator and discriminator are trained unsupervisedly in the adversarial setting, which allows the discriminator to improve detection performance by generator-generated PFMs. Experiments on the publicly available UNSW-NB15 dataset demonstrate that SEMI-WGAN-GP can achieve 90.53% accuracy using a few labeled samples (20% of the samples in the dataset are marked), exceeding the 79.92% and 84.94% of fully supervised multilayer perceptron network (MLP) and 2- dimensional convolutional neural network (2DCNN). In addition, SEMI-WGAN-GP also achieves better detection performance than SEMI-DCGAN by generating better samples.","PeriodicalId":349113,"journal":{"name":"2022 IEEE 6th Advanced Information Technology, Electronic and Automation Control Conference (IAEAC )","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129180164","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}