{"title":"Developing the intelligent predetermined control method for a new temperature and humidity chamber: A Case study for rising temperature under constant relative humidity","authors":"S. Hung, A. Lin, Yung-Han Chen","doi":"10.1109/IAEAC.2015.7428588","DOIUrl":"https://doi.org/10.1109/IAEAC.2015.7428588","url":null,"abstract":"This paper advances the Intelligent Predetermined Control Method (IPCM) to improve the energy and water consumption and the performance of the test chamber. The IPCM is composed of scheduling the optimal control path, calculating the required heat and the mass of water vapor along the path, actuating the precise heater and humidifier to meet the chamber demands. To verify the feasibility of IPCM, a case of rising temperature with constant relative humidity under no load condition is experimented. The results show that the error of relative humidity from 34 °C to 42.5 °C at constant relative humidity 48% is within ±2% and indicate that IPCM is feasible in energy and water saving and more sophisticated in precision temperature and humidity control.","PeriodicalId":398100,"journal":{"name":"2015 IEEE Advanced Information Technology, Electronic and Automation Control Conference (IAEAC)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116895972","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Contrastive analysis of transient potential of wind turbine onshore and offshore in lightning strokes","authors":"Hao Wu, Li Zhang","doi":"10.1109/IAEAC.2015.7428751","DOIUrl":"https://doi.org/10.1109/IAEAC.2015.7428751","url":null,"abstract":"For the lack of systematic research of lightning protection design of the wind turbine, it is necessary for further study of the transient effect caused by lightning. Essentially, the process that lightning current flows through the turbine is a wave process. In this paper, wave-process theory is adopted when effect of wave process on the transient potential is analyzed. With the software ATP-EMTP, oscillation of transient potential throughout the wind turbine is simulated under various conditions, such as different tower body height, soil resistivity and size of the grounding device. The influence of various conditions on the frequency of oscillation is also studied. On this basis, an improved wave impedance model for the wind turbine offshore is put forward. Actually, parts of the wind turbine offshore located in different situations have different wave impedances. The multi-wave impedance model is divided into three segments. By applying this model, simulation of lightning hitting the wind turbine onshore and offshore is carried out. The transient potential at the top of the blade and the grounding device is analyzed. Through a comparative analysis, their respective characteristic is get. For the wind turbine onshore, the amplitude of transient potential oscillation is far larger, which may lead to more sever induced over-voltage. For the wind turbine offshore, the frequency of transient potential oscillation is far higher, which may cause more damage to the weak electricity system of the wind turbine. So there should be respective emphases against lightning strike for different types wind turbine, which would be a reference basis for lightning protection design of the wind turbine.","PeriodicalId":398100,"journal":{"name":"2015 IEEE Advanced Information Technology, Electronic and Automation Control Conference (IAEAC)","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117249861","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Numerical simulation on the acoustic characteristics of the Hartmann acoustic generator array","authors":"Chen Rensong, Wang Guoqing, Chen Xiuhai, Gao Xinjun, Jian Junbo, Pei Yongquan","doi":"10.1109/IAEAC.2015.7428592","DOIUrl":"https://doi.org/10.1109/IAEAC.2015.7428592","url":null,"abstract":"Based on the method FW-H acoustic model, the acoustic characteristics of the Hartmann acoustic generator array were numerically calculated, with different inlet pressure 3.12atm, 4.12atm, 5.12atm, 6.12atm, 7.12atm and 8.12atm. The acoustic intensity empirical equations were introduced off the downstream, by nonlinear fitting the calculated intensity results about different inlet pressure. The test of significance was taken with F function, and the results show that the confidence level is at 10-4, and the regression level is high. The degree of belief of intensity empirical equations is high. The results of the paper are significant for the application of the Hartmann acoustic generator array.","PeriodicalId":398100,"journal":{"name":"2015 IEEE Advanced Information Technology, Electronic and Automation Control Conference (IAEAC)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116181308","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Energy management strategy of a new dual clutch parallel-series PHEV","authors":"C. Du, Xuerong Ding","doi":"10.1109/IAEAC.2015.7428688","DOIUrl":"https://doi.org/10.1109/IAEAC.2015.7428688","url":null,"abstract":"In order to improve vehicle fuel economy, an energy management strategy is designed. The model of a plug-in hybrid electric vehicle (PHEV) with dual clutch is constructed by combining GT-drive and MATLAB/Simulink. Different driving cycles are chose to run the simulation to verify energy management strategy. The results show that the energy management strategy can meet the power demand, and economy has improved significantly compared with the car equipped with single power source-engine.","PeriodicalId":398100,"journal":{"name":"2015 IEEE Advanced Information Technology, Electronic and Automation Control Conference (IAEAC)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116260783","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Optimization of coal-fired boiler using neural network improved by genetic algorithm","authors":"Lu Liu, Kewen Li, Junling Gao","doi":"10.1109/IAEAC.2015.7428617","DOIUrl":"https://doi.org/10.1109/IAEAC.2015.7428617","url":null,"abstract":"With the energy shortage and environment crisis, it draws public attention to improve the efficiency of coal-fired boiler combustion and reduce pollutant emission. However, operators adjust the coal-fired boiler by the production experience which has less scientific and much more randomness. At the same time, the method between improving efficiency and reducing the NOx emissions is so different that it is hard to get the adjustment point by the experiment. It is meaningful to research the coal-fired boiler optimization simulation. The study improves the neural network by genetic algorithm, and uses it to develop a model on the basis of optimal combustion experiment data, and optimizes the combustion parameters by the genetic algorithm to guide employee to adjust the fuel, air rate to achieve the optimum production. The experiment shows that the method of developing a mode of data of optimal combustion experiment by improved neural network and optimizing the parameters by genetic algorithm can guide the production better.","PeriodicalId":398100,"journal":{"name":"2015 IEEE Advanced Information Technology, Electronic and Automation Control Conference (IAEAC)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114829714","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Dry beach of tailings dam length measurement based on waterline recognition","authors":"Qianxin Huang, Qing Li, Yanjie Wang, Jinfeng Zhang","doi":"10.1109/IAEAC.2015.7428604","DOIUrl":"https://doi.org/10.1109/IAEAC.2015.7428604","url":null,"abstract":"According to the terrain features of the tailings dam, the water boundary image of the tailings dam is obtained by the acquisition of the water. The contour recognition, threshold segmentation, and watershed algorithm can be used to retrieve the boundary between dry beaches and water surface. Analyze and deal with the image pixel coordinates, the most accurate pixel coordinates of waterline can be real-time measured. According to the terrain characteristics of tailings pond, through camera monocular visual to calculate the waterline pixel coordinates and the actual length of beach geometric conversion formula, and real-time monitoring of dry beach length. Based on monocular vision with the fixed dry beach slope, the algorithm is proved to meet the requirements of dry beach length measurement.","PeriodicalId":398100,"journal":{"name":"2015 IEEE Advanced Information Technology, Electronic and Automation Control Conference (IAEAC)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114833292","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Huang Jing, Ruan Xiaogang, Xiao Yao, Z. Xiaoping, Liu Xiaoyang
{"title":"Operant conditioning model in autonomous navigation","authors":"Huang Jing, Ruan Xiaogang, Xiao Yao, Z. Xiaoping, Liu Xiaoyang","doi":"10.1109/IAEAC.2015.7428710","DOIUrl":"https://doi.org/10.1109/IAEAC.2015.7428710","url":null,"abstract":"To solve the navigation problem for mobile robots, we present a model based on the operant conditioning mechanism (OCM). 8 elements consist of the model, including state set, action set, learning mechanism and system entropy etc. As the core of the model, the learning mechanism is in accordance with operant conditioning principles, which makes agents learn the actions with reward and avoid the actions without reward. We test the model's function in several ways and change the simulation platform and environment map. The results in both experiments show that the proposed model is effective.","PeriodicalId":398100,"journal":{"name":"2015 IEEE Advanced Information Technology, Electronic and Automation Control Conference (IAEAC)","volume":"60 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121029087","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Methods for generating three-dimensional cloth wrinkle based on wrinkle baseline","authors":"Minggang Jing, Bing He, Yue Lv","doi":"10.1109/IAEAC.2015.7428644","DOIUrl":"https://doi.org/10.1109/IAEAC.2015.7428644","url":null,"abstract":"In the process of clothing simulation, visual authenticity of simulating effect has always been a criterion to measure the value of clothing simulation. In real life, wrinkle may occur to flexible clothing due to the interaction of forces, and are the major details of clothing fabrics that cannot be ignored. Hence, generating of wrinkles can intensify visual authenticity of clothing simulation and simulation of wrinkles has become an integral part for achieving authentic simulation of flexible clothing. This Paper has further studied on the methods for generating three-dimensional (3D) wrinkles. We proposed a new method for generating 3D wrinkles based on wrinkle baseline. The first step is to generate 3D wrinkle surface by convolution surface structuring method. Then generate finally clothing wrinkle by mapped the vertex in wrinkle area onto convolution surface. At last, adjusted section shape of the 3D wrinkles generated, so as to improve visual authenticity of clothing wrinkles.","PeriodicalId":398100,"journal":{"name":"2015 IEEE Advanced Information Technology, Electronic and Automation Control Conference (IAEAC)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128142809","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Novel group key transfer protocol for big data security","authors":"Changxiao Zhao, Jianhua Liu","doi":"10.1109/IAEAC.2015.7428539","DOIUrl":"https://doi.org/10.1109/IAEAC.2015.7428539","url":null,"abstract":"A dynamic group key transfer protocol is presented to meet the requirements of the secure, efficient and practical group communication based on big data. Any group member is allowed to be an initiator to distribute a random number as a group key in the protocol, which can be executed without an online key generation center (KGC). The security of the protocol is based on the Diffie-Hellman key agreement and a linear secret sharing scheme. The existing secret shared between the initiator and the other group members do not need to be updated when the group members are changing, thus, it is very efficient and is desirable for many group-oriented applications over big data.","PeriodicalId":398100,"journal":{"name":"2015 IEEE Advanced Information Technology, Electronic and Automation Control Conference (IAEAC)","volume":"85 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126590717","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Forecasting severity of software vulnerability using grey model GM(1,1)","authors":"Jinkun Geng, Daren Ye, Ping Luo","doi":"10.1109/IAEAC.2015.7428572","DOIUrl":"https://doi.org/10.1109/IAEAC.2015.7428572","url":null,"abstract":"Vulnerabilities usually represents the risk level of software, and it is of high value to forecast vulnerabilities so as to evaluate the security level of software. Current researches mainly focus on predicting the number of vulnerabilities or the occurrence time of vulnerabilities, however, to our best knowledge, there are no other researches focusing on the prediction of vulnerabilities' severity, which we think is an important aspect reflecting vulnerabilities and software security. To compensate for this deficiency, we borrows the grey model GM(1,1) from grey system theory to forecast the severity of vulnerabilities. The experiment is carried on the real data collected from CVE and proves the feasibility of our predicting method.","PeriodicalId":398100,"journal":{"name":"2015 IEEE Advanced Information Technology, Electronic and Automation Control Conference (IAEAC)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124381313","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}