2018 IEEE 3rd Advanced Information Technology, Electronic and Automation Control Conference (IAEAC)最新文献

筛选
英文 中文
Torque ripple reduction of four-phase SRM based on DTC method 基于直接转矩控制方法的四相SRM转矩脉动抑制
Yufei Han, P. Xu, Qishuang Ma
{"title":"Torque ripple reduction of four-phase SRM based on DTC method","authors":"Yufei Han, P. Xu, Qishuang Ma","doi":"10.1109/IAEAC.2018.8577728","DOIUrl":"https://doi.org/10.1109/IAEAC.2018.8577728","url":null,"abstract":"Switched reluctance motor (SRM) has attracted attention of the motor industry due to its simple structure, high reliability and low cost. However, the inherent shortcoming of SRM, principally the torque ripple, limited its development. In this paper, the direct torque control (DTC) method for four-phase SRM will be researched. The relationship between space flux vector and voltage vector will be analyzed, and the switch on-off state principle will be established. The DTC control strategy is simulated by using Simulink, compared with the widely used traditional strategy -current chopper control (CCC). The simulation shows that DTC for four-phase (8/6) SRM can reduce the torque ripple with 73% compared to the traditional strategy.","PeriodicalId":6573,"journal":{"name":"2018 IEEE 3rd Advanced Information Technology, Electronic and Automation Control Conference (IAEAC)","volume":"42 1","pages":"994-997"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73297032","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
User Association in Cache-enabled Ultra Dense Network with JT CoMP 使用JT CoMP的启用缓存的超密集网络中的用户关联
Siyun Chen, Ye Wang, Jia Yu, Nian-sheng Wang, Yan Yan
{"title":"User Association in Cache-enabled Ultra Dense Network with JT CoMP","authors":"Siyun Chen, Ye Wang, Jia Yu, Nian-sheng Wang, Yan Yan","doi":"10.1109/IAEAC.2018.8577878","DOIUrl":"https://doi.org/10.1109/IAEAC.2018.8577878","url":null,"abstract":"Coordinated Multi Point(CoMP) can be employed to reduce interference and improve network throughput in Ultra Dense Network(UDN). However, backhaul capacity is a bottleneck in achieving the goal. Fortunately, proactive caching is a promising technology to alleviate backhaul load. In a cache-enabled system with CoMP, user association is an important problem which can give prominence to its advantage. In this paper, to pursue large network throughput gain at less cost of backhaul load, we formulate user association problem as an Integer Programming(IP) problem. Given the strategy of content placement, we propose an N-Best Binary Particle Swarm Optimization(NB-BPSO) algorithm to solve the problem. Simulation results show that our algorithm improves network throughput and reduces backhaul traffic significantly compared with traditional user association schemes.","PeriodicalId":6573,"journal":{"name":"2018 IEEE 3rd Advanced Information Technology, Electronic and Automation Control Conference (IAEAC)","volume":"206 1","pages":"964-968"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80431110","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Application of Cloud Model and Matter Element Theory in Transformer Fault Diagnosis 云模型和物元理论在变压器故障诊断中的应用
Tao Wang, Li-qun Shang, Xianmin Ma
{"title":"Application of Cloud Model and Matter Element Theory in Transformer Fault Diagnosis","authors":"Tao Wang, Li-qun Shang, Xianmin Ma","doi":"10.1109/IAEAC.2018.8577253","DOIUrl":"https://doi.org/10.1109/IAEAC.2018.8577253","url":null,"abstract":"Based on cloud model and matter element theory, and combining the uncertain reasoning characteristics of the cloud model and qualitative and quantitative analysis can be carried out at the same time by matter element theory, a power transformer fault diagnosis method is proposed, which effectively solves the problem of fewer data samples, especially fewer fault data samples. Taking the actual data as an example, the improved matter-element theory model and correlation calculation data are compared, and the results show that the improved matter element theory model has higher diagnostic accuracy than traditional methods. Example analysis verifies the correctness and effectiveness of the method.","PeriodicalId":6573,"journal":{"name":"2018 IEEE 3rd Advanced Information Technology, Electronic and Automation Control Conference (IAEAC)","volume":"32 1","pages":"2089-2092"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76934725","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Secure Dual-Core Processor Design for Embedded Terminal Device 嵌入式终端设备安全双核处理器设计
Xiaosheng Wang, Yongfei Han, Yanchun Yang
{"title":"A Secure Dual-Core Processor Design for Embedded Terminal Device","authors":"Xiaosheng Wang, Yongfei Han, Yanchun Yang","doi":"10.1109/IAEAC.2018.8577926","DOIUrl":"https://doi.org/10.1109/IAEAC.2018.8577926","url":null,"abstract":"Embedded terminal devices are widely used in security-critical systems such as financial payments, and the security of their confidential data is becoming a concern for people. This paper presents a design method of embedded secure dual-core processor for smart terminal devices. The method uses a combination of physical security design and logical security design to protect the confidential data. In the physical security design, a physical isolation between the two cores is implemented through the interconnection network and the dual-core communication module, so that the confidential data runs in a closed environment completely isolated from the actual application to prevent the possibility of the confidential data being drawn at the application development terminal. In the logical security design, using the advantages of dual core, a combination of software and hardware is adopted to implement two-core cooperative encryption to prevent side-channel attacks from leaking confidential data. The proposed processor has very little hardware overhead and performance penalty.","PeriodicalId":6573,"journal":{"name":"2018 IEEE 3rd Advanced Information Technology, Electronic and Automation Control Conference (IAEAC)","volume":"25 1","pages":"1771-1775"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77172816","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Rapid and Coordinated Charging Strategy for Private Electric Vehicles 私人电动汽车快速协调充电策略
Hengjie Li, L. Wen, Wei Chen, Xu Gong, Xianqiang Zeng
{"title":"The Rapid and Coordinated Charging Strategy for Private Electric Vehicles","authors":"Hengjie Li, L. Wen, Wei Chen, Xu Gong, Xianqiang Zeng","doi":"10.1109/IAEAC.2018.8577842","DOIUrl":"https://doi.org/10.1109/IAEAC.2018.8577842","url":null,"abstract":"In order to solve the problem of the rapid and coordinated charging of private electric vehicles, two coordinated charging strategies were formulated under the rapid charging mode. One is to establish a coordinated charging strategy that minimizes the total charging time of electric vehicles, the minimum of power standard deviation and the peak-valley difference of distribution networks. The multi-objective function is normalized to a single-target solution by weighted summation method. The other is to use the total charging time of electric vehicles as a constraint to achieve peak clipping and filling of the distribution network. Taking the collected traffic data of weekdays and holidays in Lanzhou City as an example, two kinds of coordinated optimization schemes were simulated and analyzed on weekdays and holidays conditions respectively, and the genetic algorithm was used to solve the problem. The results show that the total charging time is the smallest when charging is uncoordinated charging, and peak clipping and filling effect of the distribution network is the worst; when electric vehicles do not consider the time target for coordinated charging, peak clipping and filling effect of the distribution network is the best and the total charging time is the longest; when electric vehicles contain the time target for coordinated charging, peak clipping and filling effect of the distribution network is intermediate.","PeriodicalId":6573,"journal":{"name":"2018 IEEE 3rd Advanced Information Technology, Electronic and Automation Control Conference (IAEAC)","volume":"44 1","pages":"196-200"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81436357","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Research and Implementation of Financial Approval System Based on jBPM Engine 基于jBPM引擎的财务审批系统的研究与实现
Hui Jiang
{"title":"Research and Implementation of Financial Approval System Based on jBPM Engine","authors":"Hui Jiang","doi":"10.1109/IAEAC.2018.8577247","DOIUrl":"https://doi.org/10.1109/IAEAC.2018.8577247","url":null,"abstract":"on the basis of analyzing and explaining the concept of workflow, this paper analyzes the open source workflow engine jBPM (Java Business Process Management) from the perspectives of architecture, database table structure, authority management and so on. Combining the financial approval process of the enterprise, a prototype of financial approval management system is developed, and the main design ideas and key technologies to be realized are expounded in details. The trial application of the system shows that the jBPM workflow engine has obvious advantages in such aspects as business process customization, automatic management process control, scalability and security. It can meet flexible and changeable needs of the business process, and does improve the efficiency of financial approval, which has guiding significance in engineering practices.","PeriodicalId":6573,"journal":{"name":"2018 IEEE 3rd Advanced Information Technology, Electronic and Automation Control Conference (IAEAC)","volume":"20 1","pages":"394-399"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81484697","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A new semi-quantum key distribution protocol with high efficiency 一种新的高效半量子密钥分发协议
W. Liu, Huaijun Zhou
{"title":"A new semi-quantum key distribution protocol with high efficiency","authors":"W. Liu, Huaijun Zhou","doi":"10.1109/IAEAC.2018.8577673","DOIUrl":"https://doi.org/10.1109/IAEAC.2018.8577673","url":null,"abstract":"Boyer et al put forward the first semi-quantum key distribution (BKM2007), which is completely robust while one side is limited. However, its efficiency is not satisfactory. In this paper, we present a high-efficient semi-quantum key distribution. The efficiency for qubits is approximately 50% while that is approximately 25% in the BKM2007 protocol, which means that the sifted key proportion of the SQKD protocol is double as that in the BKM2007 protocol. Furthermore, the proportion of information bits in our SQKD protocol is not lower than that of the BKM2007 protocol. Analysis shows that our protocol is still robust.","PeriodicalId":6573,"journal":{"name":"2018 IEEE 3rd Advanced Information Technology, Electronic and Automation Control Conference (IAEAC)","volume":"18 1","pages":"2424-2427"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82490178","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Research and Realization of Nginx-based Dynamic Feedback Load Balancing Algorithm 基于nginx的动态反馈负载均衡算法的研究与实现
Zepeng Wen, Gongliang Li, Guang-Hong Yang
{"title":"Research and Realization of Nginx-based Dynamic Feedback Load Balancing Algorithm","authors":"Zepeng Wen, Gongliang Li, Guang-Hong Yang","doi":"10.1109/IAEAC.2018.8577911","DOIUrl":"https://doi.org/10.1109/IAEAC.2018.8577911","url":null,"abstract":"With the rapid development of internet technology, internet has brought great conveniences to the vast majority of users. However, the exploding of concurrent visits also raised huge challenges to the working capacity of network servers. Thus server cluster and load balancing technologies become a powerful approach to deal with the bottleneck of server terminals. The Nginx-based load balancing method, featured with its high cost performance and extensibility, has been widely applied. This paper raised a Nginx-based dynamic feedback load balancing algorithm. This loading algorithm module is realized by designing an algorithm on the basis of queuing theory and through Nginx plug-in mechanism. Then the paper established an experiment environment, and used Loadrunner software to conduct a comparison test on the performances of the Nginx built-in IP Hash algorithm & Weighted Round-Robin Scheduling and the dynamic feedback algorithm raised in this paper. The results showed that dynamic algorithm raised in this paper can better realize the load balancing.","PeriodicalId":6573,"journal":{"name":"2018 IEEE 3rd Advanced Information Technology, Electronic and Automation Control Conference (IAEAC)","volume":"29 1","pages":"2541-2546"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76326476","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Research on Load Balancing Method in Cloud Computing 云计算中负载均衡方法的研究
Qingyu Wang, Dongfei Liu
{"title":"Research on Load Balancing Method in Cloud Computing","authors":"Qingyu Wang, Dongfei Liu","doi":"10.1109/IAEAC.2018.8577591","DOIUrl":"https://doi.org/10.1109/IAEAC.2018.8577591","url":null,"abstract":"With the development and application of computer technology, cloud computing as a new computing model has become a hot topic in academic research. How to effectively use cluster resources and improve the overall performance of the system have become hot topics and problems in the field of cloud computing. And a reasonable method of load balance is an effective way to solve this problem. Based on the deep study of Shuffled Frog Leading Algorithm, this paper proposes a method of load balance based on improved Shuffled Frog Leaping Algorithm (ISFLA) in cloud computing. Finally, a simulation experiment of the load balance based on improved Shuffled Frog Leaping Algorithm was performed on CloudSim, a simulation platform for cloud computing. Through comparing with the experimental results of other intelligent optimization algorithms, it was found that ISFLA has a better load balance effect and it is feasible.","PeriodicalId":6573,"journal":{"name":"2018 IEEE 3rd Advanced Information Technology, Electronic and Automation Control Conference (IAEAC)","volume":"75 1","pages":"1489-1493"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76080275","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Object detection based on Online hard examples mining with residual network 基于残差网络在线硬样例挖掘的目标检测
Zhang Chao, Chen Ying
{"title":"Object detection based on Online hard examples mining with residual network","authors":"Zhang Chao, Chen Ying","doi":"10.1109/IAEAC.2018.8577519","DOIUrl":"https://doi.org/10.1109/IAEAC.2018.8577519","url":null,"abstract":"In order to detect objects more correctly in pictures, an object detection algorithm based on the Online hard example mining with residual network is put forward, which takes Faster R-CNN as a benchmark. The working method of Faster R-CNN based on deep learning is portrayed, and the drawback and improvement ways of the algorithm are analyzed. More specifically, a residual network is used to replace the original ZF or VGG network to obtain more effective deep convolution feature maps. Besides, in order to strengthen the generalization capacity of the learning network model, the network parameters with hard examples are regenerated during training to make the network training more effectively. Finally, results of the experiments on Pascal VOC2007, Pascal VOC2007+VOC2012 and BIT datasets indicate that compared with Faster R-CNN, our method improves detection accuracy by 3.5%, 7.1%, 6.4% severally on the three datasets.","PeriodicalId":6573,"journal":{"name":"2018 IEEE 3rd Advanced Information Technology, Electronic and Automation Control Conference (IAEAC)","volume":"33 1","pages":"1634-1638"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87953065","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信