Paper
9 December 2022 Development and implementation of air switch detection system based on docker technology
Weijie Zeng, Hanjun Deng, Rui Huang, Zhi Wang
Author Affiliations +
Proceedings Volume 12492, International Workshop on Automation, Control, and Communication Engineering (IWACCE 2022); 1249211 (2022) https://doi.org/10.1117/12.2662810
Event: International Workshop on Automation, Control, and Communication Engineering (IWACCE 2022), 2022, Wuhan, China
Abstract
There are a large number of air switches in substations, computer rooms and other places. It is often necessary to artificially change the opening and closing states of the air switches for specific tasks. Due to the high labor cost and potential safety hazards, it has great potential to implement edge-computing-based deep learning models in these scenarios. However, these scenarios have complex conditions and many electromagnetic interferences, and the long-term stable operation of deep learning models requires high virtual isolation technology involved in edge computing. In this context, this paper uses virtual isolation technology and deep learning model for air switch detection, uses the trained air switch detection model based on YOLOX deep learning framework to make mirror images, and completes isolation enhancement in the generation of mirror images. Besides, on this basis, a safe and efficient control decision-making scheme based on neural network is proposed.
© (2022) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Weijie Zeng, Hanjun Deng, Rui Huang, and Zhi Wang "Development and implementation of air switch detection system based on docker technology", Proc. SPIE 12492, International Workshop on Automation, Control, and Communication Engineering (IWACCE 2022), 1249211 (9 December 2022); https://doi.org/10.1117/12.2662810
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Switches

Neural networks

Computer security

Control systems

Image processing

Data modeling

Computing systems

Back to Top