{"title":"Design of A Interdigital Capacitive Sensor for Detecting Corrosion of Reinforcement in Concrete","authors":"Y. Along","doi":"10.1109/EPCE58798.2023.00024","DOIUrl":"https://doi.org/10.1109/EPCE58798.2023.00024","url":null,"abstract":"Corrosion of reinforcement is one of the main reasons for the deterioration of durability of reinforced concrete structures. In view of the shortcomings of traditional capacitive corrosion sensor, a design of interdigital capacitive corrosion detection sensor for steel bar in concrete is proposed. Taking Q235 carbon steel as an example, this paper introduces the structure and working principle of the corrosion sensor, and analyzes the influence of material size and sectional area loss. The corrosion sensor consists of two comb-shaped electrodes made of, an acrylic substrate and an outer package made of hot glue. In order to verify its feasibility and stability, four corrosion sensors were embedded in the concrete and four concrete samples were prepared. The electrochemical accelerated corrosion test was carried out on four concrete specimens, and the relationship between the capacitance change of the corrosion sensor and the corrosion degree of the comb electrode was quantitatively analyzed by the weight-loss method. The experimental results show that the capacitive corrosion sensor designed in this paper adopts interdigital structure, which can greatly improve the sensitivity of the steel corrosion sensor and more effectively detect the corrosion state of Q235 carbon steel. In addition, the corrosion sensor is highly sensitive to the early corrosion and corrosion transition of Q235 carbon steel, which provides a reliable basis for timely and effective maintenance.","PeriodicalId":355442,"journal":{"name":"2023 2nd Asia Conference on Electrical, Power and Computer Engineering (EPCE)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115418813","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Sentiment and Semantic Network Analysis-based Study on the Factors Influencing the \"Sense of Urban Happiness\" : —With a Focus on Hangzhou","authors":"Xue-Fang Zhang, Rong-Mei Chen","doi":"10.1109/EPCE58798.2023.00012","DOIUrl":"https://doi.org/10.1109/EPCE58798.2023.00012","url":null,"abstract":"This study takes Hangzhou, which has won the title of \"China’s Happiest City\" for 16 consecutive years, as an example based on the comment data on the sense of urban happiness sourced from mainstream social media platforms. The sentiment tendency, topics in comments, and their correlations among social media users’ comments on \"happiness in Hangzhou\" are studied using the sentiment analysis, high-frequency keywords, and semantic network analysis methods. According to the results of this study, Hangzhou’s ecological environment, digital economy, digital public services, cultural resources, and civilized transportation have positive influences on people’s sense of happiness, whereas high housing and commodity prices, income inequality, and stress from overtime work have negative influences on the sense of urban happiness. Based on the foregoing research results, this study proposes relevant suggestions for the construction of happy cities.","PeriodicalId":355442,"journal":{"name":"2023 2nd Asia Conference on Electrical, Power and Computer Engineering (EPCE)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126838502","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Direct power control of a brushless doubly-fed induction generator under an unbalanced power grid","authors":"Xiaoliang Yang, Jiajun Bai, Yixuan Qin, Jiane Zhao","doi":"10.1109/EPCE58798.2023.00026","DOIUrl":"https://doi.org/10.1109/EPCE58798.2023.00026","url":null,"abstract":"The output power of the brushless doubly-fed generator (BDFIG) in unbalanced power system contains the second-harmonic fluctuation and the stator current is distorted. To reduce the influnce of unbalanced power grid on BDFIG, the composition of instantaneous active and reactive power of BDFIG stator output under unbalanced power grid is deduced and analyzed, and a new approaching rate integral sliding mode variable structure with PI controller is proposed. The integral sliding mode variable structure is used to control the DC component of the output power of BDFIG under the unbalanced power grid. The double frequency fluctuation of power and the distortion of stator current are suppressed by PI control of stator current instruction. Finally, the influence of unbalanced power grid on BDFIG is reduced. In this article, the calculation principle of voltage positive and negative sequence decomposition for unbalanced power grid voltage is studied, and a fast positive and negative sequence decomposition method is designed to improve the delay problem of T/4 delay separation method, the BDFIG direct power control capability under unbalanced grid voltage is improved effectively. Finally, Matlab/Simulink simulation results demonstrate the effectiveness of the control strategy.","PeriodicalId":355442,"journal":{"name":"2023 2nd Asia Conference on Electrical, Power and Computer Engineering (EPCE)","volume":"111 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124583156","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Fusing Decision Tree and Deep Reinforcement Learning for Demand Response Optimization of Variable Volume Water Heaters","authors":"Xinrun Liu, Hu Xu, Xuan Zhou, Lei Xue, Wei Zhou","doi":"10.1109/EPCE58798.2023.00030","DOIUrl":"https://doi.org/10.1109/EPCE58798.2023.00030","url":null,"abstract":"The variable volume water heaters have greater potential to save energy and offer demand response flexibility compared to traditional fixed volume water heaters. However, optimized scheduling of variable volume water heaters must account for system uncertainties and meet the need for quick decision making. To tackle this problem, we propose a demand response optimization approach for variable volume water heaters that combines decision trees with deep reinforcement learning. Firstly, we establish the optimized scheduling framework based on fusing decision tree and reinforcement learning. Secondly, we construct a decision tree offline with training data generated by mathematical optimization methods. Then, we design a fusion model focusing on the dynamic regulation of action probability, and design a fusion algorithm and network. Simulation results show that the proposed algorithm can automatically adapt to uncertain environments and reduce energy costs of variable volume water heater by 23.2% compared to fixed volume water heaters, while satisfying user comfort requirements.","PeriodicalId":355442,"journal":{"name":"2023 2nd Asia Conference on Electrical, Power and Computer Engineering (EPCE)","volume":"89 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133868107","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ziwen Wang, Jun Xiao, You Situ, A. Huang, J. Su, Weihong Chen, Shuan Liu, Jingguang Li, Weijian Lai, Songlin Luo, Jinghang Li, Zhicheng Chen
{"title":"Analysis of key influencing factors and optimization strategy for safety boundary of converter station","authors":"Ziwen Wang, Jun Xiao, You Situ, A. Huang, J. Su, Weihong Chen, Shuan Liu, Jingguang Li, Weijian Lai, Songlin Luo, Jinghang Li, Zhicheng Chen","doi":"10.1109/EPCE58798.2023.00016","DOIUrl":"https://doi.org/10.1109/EPCE58798.2023.00016","url":null,"abstract":"In interconnected systems with increasing stability margin, power flow transfer may cause converter stations to operate outside the safety boundary, causing cascading failures of DC systems. In order to clarify key factors affecting safety boundary of converter station and propose effective and feasible optimization strategies. Firstly, based on PQ power domain, this paper analyzes constraints that affect safe operation of converter station, and determines safety boundary model of converter station composed of the intersection of multiple constraint power domains. Then the key influencing factors of safety boundary of converter station are analyzed, and optimization method of safety boundary to adjust AC system impedance is proposed by establishing the optimization interval of AC system impedance. Finally, the correctness of the theoretical analysis is verified by the simulation results based on the PSCAD/EMTDC software.","PeriodicalId":355442,"journal":{"name":"2023 2nd Asia Conference on Electrical, Power and Computer Engineering (EPCE)","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116127317","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Forearm Movements Classification Research to Increase Subjects Independence","authors":"Lei Zhang, Along Wang, Lei Zhang, Jie Wang","doi":"10.1109/EPCE58798.2023.00029","DOIUrl":"https://doi.org/10.1109/EPCE58798.2023.00029","url":null,"abstract":"The difficulty of current pattern recognition is its applicability. Many manuscripts with high recognition accuracy are based on extensive training in the laboratory. In practice, it is impossible to carry out a large amount of exercise for every participant, so how to reduce the dependence on participants has become the focus of current research. This study introduced a Fuzzy C-Means (FCM) algorithm to realize the forearm movements' recognition to increase subjects' in-dependence. The method could be used between individuals; that is, every participant could select the actions by himself, breaking the traditional defect that could only identify the specific activities. The research paper shows effective methods from 2-channel electrodes data collected and analyzed from 8 participants. These participants selected five movements, and the average accuracy was 80.26%. It suggests that the control strategy chosen could be employed on different individuals. This method can promote the development of rehabilitation training for patients with muscle weakness.","PeriodicalId":355442,"journal":{"name":"2023 2nd Asia Conference on Electrical, Power and Computer Engineering (EPCE)","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132232923","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Theory and Application Exploration of Building Life Cycle Management Based on BIM Technology : Take the Student and Teacher Activity Center of Chengdu University of Technology as an example","authors":"Wu Zhihao, Wang Jinchuan","doi":"10.1109/EPCE58798.2023.00046","DOIUrl":"https://doi.org/10.1109/EPCE58798.2023.00046","url":null,"abstract":"To address issues such as repeated changes in construction project drawings, communication barriers between various parties, and low modeling efficiency, this article takes the Student and Teacher Activity Center of Chengdu University of Technology as an example to explore the theoretical route and specific implementation content of building information modeling in the forward design, construction, operation, and maintenance stages. In the forward design phase, the optimization of the architectural model is realized based on the reusability of the BIM model, and the construction drawings are drawn. During the construction phase, a series of Glodon software is used for engineering project management. During the operation and maintenance phase, build a BIM operation and maintenance platform to provide efficient services to the owners. In the management of the entire lifecycle of buildings, Dynamo programming software is integrated for targeted secondary development of different stages of Revit to achieve modeling efficiency and visualization.","PeriodicalId":355442,"journal":{"name":"2023 2nd Asia Conference on Electrical, Power and Computer Engineering (EPCE)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131950421","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Songyang Li, Huaqing Li, Zhe Li, L. Fan, Lifeng Zheng, Jun Yu Li
{"title":"Distributed Primal-Dual Algorithm for Seeking Generalized Nash Equilibria in Aggregative Games","authors":"Songyang Li, Huaqing Li, Zhe Li, L. Fan, Lifeng Zheng, Jun Yu Li","doi":"10.1109/EPCE58798.2023.00027","DOIUrl":"https://doi.org/10.1109/EPCE58798.2023.00027","url":null,"abstract":"The paper proposes a distributed algorithm for finding generalized Nash equilibria (GNE) in aggregative games with globally coupled constraints. In such games, each player seeks to minimize its own local objective function, which is dependent on both its own decision and the aggregate of all players in the game. The objective is to find a solution where no player can unilaterally improve its outcome, which is known as a GNE. The proposed algorithm is distributed, meaning that each player only shares its local information with its neighbors over an undirected connected graph. To achieve this, the paper introduces a local estimation of the aggregate of overall player decisions for each player. The paper proves that the proposed algorithm can converge to a v-GNE with fixed step-sizes. Numerical studies are conducted to verify the convergence and effectiveness of the proposed algorithm. Overall, the paper presents a promising approach for finding GNE in aggregative games with globally coupled constraints in a distributed manner.","PeriodicalId":355442,"journal":{"name":"2023 2nd Asia Conference on Electrical, Power and Computer Engineering (EPCE)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127685946","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on Industrial Internet Data Security Technology based on Formal Verification of SM4","authors":"Zhenya Chen, Yushen Deng, Ming Yang, Chao Mu, Shuo Xu, Fazong Wu","doi":"10.1109/EPCE58798.2023.00039","DOIUrl":"https://doi.org/10.1109/EPCE58798.2023.00039","url":null,"abstract":"Industrial Internet promotes the transformation of industrial platform from business system driven to data driven through the flow of industrial data between massive multi-source equipment and heterogeneous systems. The data flow of industrial Internet involves the interactive transmission of a large number of key sensitive information between enterprises. Coupled with its inherent openness and heterogeneity, it is facing serious security challenges such as sensitive data leakage and integrity destruction. Cryptography technology is one of the important methods to ensure data security. Among them, the national cryptographic algorithm can meet the requirements of security, autonomy and controllability of Chinese industrial Internet data, and avoid the risk of \"backdoor\" when the current mainstream international cryptography algorithm protects the key sensitive data. However, there are still security threats such as memory leakage and time-side channel attack which cause the invalidity of encryption mechanism when the national cryptographic algorithm is deployed in industrial Internet system. Formal verification method is an important method to verify the security and reliability of cryptographic algorithms. Existing researches have designed a variety of formal verification mechanisms for the underlying cryptographic algorithms of some structures and protocols, but the research on formal verification for national cryptographic algorithm is still in a blank stage. This paper proposes a formal verification method of SM4 cryptographic algorithm based on programming framework F*, which can ensure the memory security and resist the time-side channel attacks during the implementation of the algorithm. And the method can reduce the security risks, when the national cryptographic algorithm is deployed in the industrial internet.","PeriodicalId":355442,"journal":{"name":"2023 2nd Asia Conference on Electrical, Power and Computer Engineering (EPCE)","volume":"185 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133465610","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A method of noisy Tibetan speakers verification based on SKA-TDNN","authors":"Zhenye Gan, Ziqian Qu, Jincheng Li, Yue Yu","doi":"10.1109/EPCE58798.2023.00009","DOIUrl":"https://doi.org/10.1109/EPCE58798.2023.00009","url":null,"abstract":"In recent years, the research of speech enhancement application technology has important practical value. At the same time, speaker recognition is widely studied and used as a very valuable biometric recognition technology. However, the application of speech enhancement and speaker recognition technology in Tibetan is few. Due to the lack of speech enhancement back-end processing, the speaker recognition system may lead to low speech quality and low intelligibility. In this paper, the backend structure framework of SKA-TDNN network and Wave-U-Net model is constructed to realize noisy Tibetan speaker verification, and the model is improved and optimized. For speaker recognition, we use the model structure of SKA-TDNN in combination with multiscale SKA (msSKA) to better model utterances with different durations. In the back-end processing of speech enhancement, we use WAVE-U-NET structure and introduce further improved optimization architecture. Experimental results show that the improved SKA- TDNN model in speaker verification than traditional investigate VGG model was reduced by 5.225%, than ECAPA -TDNN model was reduced by 1.5%, and got close to 0.94 STOI in speech enhancement.","PeriodicalId":355442,"journal":{"name":"2023 2nd Asia Conference on Electrical, Power and Computer Engineering (EPCE)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123850970","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}