2015 IEEE Advanced Information Technology, Electronic and Automation Control Conference (IAEAC)最新文献

筛选
英文 中文
Developing the intelligent predetermined control method for a new temperature and humidity chamber: A Case study for rising temperature under constant relative humidity 新型温湿度室智能预定控制方法的研究——以恒定相对湿度下的温升为例
S. Hung, A. Lin, Yung-Han Chen
{"title":"Developing the intelligent predetermined control method for a new temperature and humidity chamber: A Case study for rising temperature under constant relative humidity","authors":"S. Hung, A. Lin, Yung-Han Chen","doi":"10.1109/IAEAC.2015.7428588","DOIUrl":"https://doi.org/10.1109/IAEAC.2015.7428588","url":null,"abstract":"This paper advances the Intelligent Predetermined Control Method (IPCM) to improve the energy and water consumption and the performance of the test chamber. The IPCM is composed of scheduling the optimal control path, calculating the required heat and the mass of water vapor along the path, actuating the precise heater and humidifier to meet the chamber demands. To verify the feasibility of IPCM, a case of rising temperature with constant relative humidity under no load condition is experimented. The results show that the error of relative humidity from 34 °C to 42.5 °C at constant relative humidity 48% is within ±2% and indicate that IPCM is feasible in energy and water saving and more sophisticated in precision temperature and humidity control.","PeriodicalId":398100,"journal":{"name":"2015 IEEE Advanced Information Technology, Electronic and Automation Control Conference (IAEAC)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116895972","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Contrastive analysis of transient potential of wind turbine onshore and offshore in lightning strokes 陆上与海上风力发电机组雷击时暂态电势对比分析
Hao Wu, Li Zhang
{"title":"Contrastive analysis of transient potential of wind turbine onshore and offshore in lightning strokes","authors":"Hao Wu, Li Zhang","doi":"10.1109/IAEAC.2015.7428751","DOIUrl":"https://doi.org/10.1109/IAEAC.2015.7428751","url":null,"abstract":"For the lack of systematic research of lightning protection design of the wind turbine, it is necessary for further study of the transient effect caused by lightning. Essentially, the process that lightning current flows through the turbine is a wave process. In this paper, wave-process theory is adopted when effect of wave process on the transient potential is analyzed. With the software ATP-EMTP, oscillation of transient potential throughout the wind turbine is simulated under various conditions, such as different tower body height, soil resistivity and size of the grounding device. The influence of various conditions on the frequency of oscillation is also studied. On this basis, an improved wave impedance model for the wind turbine offshore is put forward. Actually, parts of the wind turbine offshore located in different situations have different wave impedances. The multi-wave impedance model is divided into three segments. By applying this model, simulation of lightning hitting the wind turbine onshore and offshore is carried out. The transient potential at the top of the blade and the grounding device is analyzed. Through a comparative analysis, their respective characteristic is get. For the wind turbine onshore, the amplitude of transient potential oscillation is far larger, which may lead to more sever induced over-voltage. For the wind turbine offshore, the frequency of transient potential oscillation is far higher, which may cause more damage to the weak electricity system of the wind turbine. So there should be respective emphases against lightning strike for different types wind turbine, which would be a reference basis for lightning protection design of the wind turbine.","PeriodicalId":398100,"journal":{"name":"2015 IEEE Advanced Information Technology, Electronic and Automation Control Conference (IAEAC)","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117249861","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Numerical simulation on the acoustic characteristics of the Hartmann acoustic generator array 哈特曼声发生器阵列声学特性的数值模拟
Chen Rensong, Wang Guoqing, Chen Xiuhai, Gao Xinjun, Jian Junbo, Pei Yongquan
{"title":"Numerical simulation on the acoustic characteristics of the Hartmann acoustic generator array","authors":"Chen Rensong, Wang Guoqing, Chen Xiuhai, Gao Xinjun, Jian Junbo, Pei Yongquan","doi":"10.1109/IAEAC.2015.7428592","DOIUrl":"https://doi.org/10.1109/IAEAC.2015.7428592","url":null,"abstract":"Based on the method FW-H acoustic model, the acoustic characteristics of the Hartmann acoustic generator array were numerically calculated, with different inlet pressure 3.12atm, 4.12atm, 5.12atm, 6.12atm, 7.12atm and 8.12atm. The acoustic intensity empirical equations were introduced off the downstream, by nonlinear fitting the calculated intensity results about different inlet pressure. The test of significance was taken with F function, and the results show that the confidence level is at 10-4, and the regression level is high. The degree of belief of intensity empirical equations is high. The results of the paper are significant for the application of the Hartmann acoustic generator array.","PeriodicalId":398100,"journal":{"name":"2015 IEEE Advanced Information Technology, Electronic and Automation Control Conference (IAEAC)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116181308","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Energy management strategy of a new dual clutch parallel-series PHEV 一种新型双离合器并联串联插电式混合动力汽车的能量管理策略
C. Du, Xuerong Ding
{"title":"Energy management strategy of a new dual clutch parallel-series PHEV","authors":"C. Du, Xuerong Ding","doi":"10.1109/IAEAC.2015.7428688","DOIUrl":"https://doi.org/10.1109/IAEAC.2015.7428688","url":null,"abstract":"In order to improve vehicle fuel economy, an energy management strategy is designed. The model of a plug-in hybrid electric vehicle (PHEV) with dual clutch is constructed by combining GT-drive and MATLAB/Simulink. Different driving cycles are chose to run the simulation to verify energy management strategy. The results show that the energy management strategy can meet the power demand, and economy has improved significantly compared with the car equipped with single power source-engine.","PeriodicalId":398100,"journal":{"name":"2015 IEEE Advanced Information Technology, Electronic and Automation Control Conference (IAEAC)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116260783","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimization of coal-fired boiler using neural network improved by genetic algorithm 基于遗传算法改进的神经网络优化燃煤锅炉
Lu Liu, Kewen Li, Junling Gao
{"title":"Optimization of coal-fired boiler using neural network improved by genetic algorithm","authors":"Lu Liu, Kewen Li, Junling Gao","doi":"10.1109/IAEAC.2015.7428617","DOIUrl":"https://doi.org/10.1109/IAEAC.2015.7428617","url":null,"abstract":"With the energy shortage and environment crisis, it draws public attention to improve the efficiency of coal-fired boiler combustion and reduce pollutant emission. However, operators adjust the coal-fired boiler by the production experience which has less scientific and much more randomness. At the same time, the method between improving efficiency and reducing the NOx emissions is so different that it is hard to get the adjustment point by the experiment. It is meaningful to research the coal-fired boiler optimization simulation. The study improves the neural network by genetic algorithm, and uses it to develop a model on the basis of optimal combustion experiment data, and optimizes the combustion parameters by the genetic algorithm to guide employee to adjust the fuel, air rate to achieve the optimum production. The experiment shows that the method of developing a mode of data of optimal combustion experiment by improved neural network and optimizing the parameters by genetic algorithm can guide the production better.","PeriodicalId":398100,"journal":{"name":"2015 IEEE Advanced Information Technology, Electronic and Automation Control Conference (IAEAC)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114829714","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Dry beach of tailings dam length measurement based on waterline recognition 基于水线识别的尾矿坝干滩长度测量
Qianxin Huang, Qing Li, Yanjie Wang, Jinfeng Zhang
{"title":"Dry beach of tailings dam length measurement based on waterline recognition","authors":"Qianxin Huang, Qing Li, Yanjie Wang, Jinfeng Zhang","doi":"10.1109/IAEAC.2015.7428604","DOIUrl":"https://doi.org/10.1109/IAEAC.2015.7428604","url":null,"abstract":"According to the terrain features of the tailings dam, the water boundary image of the tailings dam is obtained by the acquisition of the water. The contour recognition, threshold segmentation, and watershed algorithm can be used to retrieve the boundary between dry beaches and water surface. Analyze and deal with the image pixel coordinates, the most accurate pixel coordinates of waterline can be real-time measured. According to the terrain characteristics of tailings pond, through camera monocular visual to calculate the waterline pixel coordinates and the actual length of beach geometric conversion formula, and real-time monitoring of dry beach length. Based on monocular vision with the fixed dry beach slope, the algorithm is proved to meet the requirements of dry beach length measurement.","PeriodicalId":398100,"journal":{"name":"2015 IEEE Advanced Information Technology, Electronic and Automation Control Conference (IAEAC)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114833292","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Operant conditioning model in autonomous navigation 自主导航中的操作性条件反射模型
Huang Jing, Ruan Xiaogang, Xiao Yao, Z. Xiaoping, Liu Xiaoyang
{"title":"Operant conditioning model in autonomous navigation","authors":"Huang Jing, Ruan Xiaogang, Xiao Yao, Z. Xiaoping, Liu Xiaoyang","doi":"10.1109/IAEAC.2015.7428710","DOIUrl":"https://doi.org/10.1109/IAEAC.2015.7428710","url":null,"abstract":"To solve the navigation problem for mobile robots, we present a model based on the operant conditioning mechanism (OCM). 8 elements consist of the model, including state set, action set, learning mechanism and system entropy etc. As the core of the model, the learning mechanism is in accordance with operant conditioning principles, which makes agents learn the actions with reward and avoid the actions without reward. We test the model's function in several ways and change the simulation platform and environment map. The results in both experiments show that the proposed model is effective.","PeriodicalId":398100,"journal":{"name":"2015 IEEE Advanced Information Technology, Electronic and Automation Control Conference (IAEAC)","volume":"60 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121029087","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Methods for generating three-dimensional cloth wrinkle based on wrinkle baseline 基于皱纹基线的织物三维皱纹生成方法
Minggang Jing, Bing He, Yue Lv
{"title":"Methods for generating three-dimensional cloth wrinkle based on wrinkle baseline","authors":"Minggang Jing, Bing He, Yue Lv","doi":"10.1109/IAEAC.2015.7428644","DOIUrl":"https://doi.org/10.1109/IAEAC.2015.7428644","url":null,"abstract":"In the process of clothing simulation, visual authenticity of simulating effect has always been a criterion to measure the value of clothing simulation. In real life, wrinkle may occur to flexible clothing due to the interaction of forces, and are the major details of clothing fabrics that cannot be ignored. Hence, generating of wrinkles can intensify visual authenticity of clothing simulation and simulation of wrinkles has become an integral part for achieving authentic simulation of flexible clothing. This Paper has further studied on the methods for generating three-dimensional (3D) wrinkles. We proposed a new method for generating 3D wrinkles based on wrinkle baseline. The first step is to generate 3D wrinkle surface by convolution surface structuring method. Then generate finally clothing wrinkle by mapped the vertex in wrinkle area onto convolution surface. At last, adjusted section shape of the 3D wrinkles generated, so as to improve visual authenticity of clothing wrinkles.","PeriodicalId":398100,"journal":{"name":"2015 IEEE Advanced Information Technology, Electronic and Automation Control Conference (IAEAC)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128142809","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Novel group key transfer protocol for big data security 面向大数据安全的新型组密钥传输协议
Changxiao Zhao, Jianhua Liu
{"title":"Novel group key transfer protocol for big data security","authors":"Changxiao Zhao, Jianhua Liu","doi":"10.1109/IAEAC.2015.7428539","DOIUrl":"https://doi.org/10.1109/IAEAC.2015.7428539","url":null,"abstract":"A dynamic group key transfer protocol is presented to meet the requirements of the secure, efficient and practical group communication based on big data. Any group member is allowed to be an initiator to distribute a random number as a group key in the protocol, which can be executed without an online key generation center (KGC). The security of the protocol is based on the Diffie-Hellman key agreement and a linear secret sharing scheme. The existing secret shared between the initiator and the other group members do not need to be updated when the group members are changing, thus, it is very efficient and is desirable for many group-oriented applications over big data.","PeriodicalId":398100,"journal":{"name":"2015 IEEE Advanced Information Technology, Electronic and Automation Control Conference (IAEAC)","volume":"85 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126590717","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Forecasting severity of software vulnerability using grey model GM(1,1) 基于灰色模型GM(1,1)的软件漏洞严重程度预测
Jinkun Geng, Daren Ye, Ping Luo
{"title":"Forecasting severity of software vulnerability using grey model GM(1,1)","authors":"Jinkun Geng, Daren Ye, Ping Luo","doi":"10.1109/IAEAC.2015.7428572","DOIUrl":"https://doi.org/10.1109/IAEAC.2015.7428572","url":null,"abstract":"Vulnerabilities usually represents the risk level of software, and it is of high value to forecast vulnerabilities so as to evaluate the security level of software. Current researches mainly focus on predicting the number of vulnerabilities or the occurrence time of vulnerabilities, however, to our best knowledge, there are no other researches focusing on the prediction of vulnerabilities' severity, which we think is an important aspect reflecting vulnerabilities and software security. To compensate for this deficiency, we borrows the grey model GM(1,1) from grey system theory to forecast the severity of vulnerabilities. The experiment is carried on the real data collected from CVE and proves the feasibility of our predicting method.","PeriodicalId":398100,"journal":{"name":"2015 IEEE Advanced Information Technology, Electronic and Automation Control Conference (IAEAC)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124381313","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信