首页 > 最新文献

2021 6th International Conference on Computer Science and Engineering (UBMK)最新文献

英文 中文
A Comparison of Machine Learning Algorithms on Lithium-ion Battery Cycle Life Prediction 锂离子电池循环寿命预测的机器学习算法比较
Pub Date : 2021-09-15 DOI: 10.1109/UBMK52708.2021.9558946
Melike Dokgöz, Y. Yaslan
With the increase of conventional vehicles and carbon emission from them boosted the need for electrical vehicles (EV). One of the major components of the EVs are their batteries and the commercialization of EVs are affected by their battery technology and performance. It is also obvious that the range of an EV is mainly affected by the lifetime of its battery. Estimation of the battery cycle life in the early cycles is one of the most important challenges for maximization of the EVs range. Charge-discharge cycles affect battery lifetime of the EV which also made the estimation of battery life cycle a matter of interest. In this study, different machine learning models are applied to predict the lifecycle of a battery at early stages of usage. Detailed experiments have been performed to analyze the prediction accuracy at early cycle numbers. Experimental results show that the error rate in cycle life estimation decreased from 9.2 to 2.4% using Adaptive Boosting method.
随着传统汽车的增加和碳排放的增加,对电动汽车(EV)的需求也随之增加。电池是电动汽车的主要组成部分之一,其电池技术和性能影响着电动汽车的商业化。同样明显的是,电动汽车的行驶里程主要受电池寿命的影响。电池早期循环寿命的评估是实现电动汽车续驶里程最大化的重要挑战之一。充放电循环影响电动汽车的电池寿命,这也使得电池寿命周期的估计成为人们感兴趣的问题。在这项研究中,不同的机器学习模型被应用于预测电池在使用早期的生命周期。通过详细的实验分析了在早期周期数下的预测精度。实验结果表明,采用自适应增强方法后,循环寿命估计错误率由9.2降低到2.4%。
{"title":"A Comparison of Machine Learning Algorithms on Lithium-ion Battery Cycle Life Prediction","authors":"Melike Dokgöz, Y. Yaslan","doi":"10.1109/UBMK52708.2021.9558946","DOIUrl":"https://doi.org/10.1109/UBMK52708.2021.9558946","url":null,"abstract":"With the increase of conventional vehicles and carbon emission from them boosted the need for electrical vehicles (EV). One of the major components of the EVs are their batteries and the commercialization of EVs are affected by their battery technology and performance. It is also obvious that the range of an EV is mainly affected by the lifetime of its battery. Estimation of the battery cycle life in the early cycles is one of the most important challenges for maximization of the EVs range. Charge-discharge cycles affect battery lifetime of the EV which also made the estimation of battery life cycle a matter of interest. In this study, different machine learning models are applied to predict the lifecycle of a battery at early stages of usage. Detailed experiments have been performed to analyze the prediction accuracy at early cycle numbers. Experimental results show that the error rate in cycle life estimation decreased from 9.2 to 2.4% using Adaptive Boosting method.","PeriodicalId":106516,"journal":{"name":"2021 6th International Conference on Computer Science and Engineering (UBMK)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125548174","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
PSO based Blockchain Committee Member Selection 基于PSO的区块链委员会成员选择
Pub Date : 2021-09-15 DOI: 10.1109/UBMK52708.2021.9559004
Marwan S. Jameel, Oguz Yayla
Implementing blockchain systems with less amount of decentralized computation power is a challenging task. One of the most essential solution in scaling the blockchain is selection of a trusted committee (TC). We intend to develop and apply a new method for selecting committee members depending on their reputation via particle swarm optimization (PSO) based update of the behavior of nodes. Indeed, this is the same concept as accumulating participants in the blockchain throughout the previous rounds of the consensus procedure.
实现具有较少分散计算能力的区块链系统是一项具有挑战性的任务。扩展区块链最重要的解决方案之一是选择可信委员会(TC)。我们打算通过基于节点行为更新的粒子群优化(PSO)来开发和应用一种根据声誉来选择委员会成员的新方法。实际上,这与在前几轮协商一致程序中积累区块链参与者的概念是相同的。
{"title":"PSO based Blockchain Committee Member Selection","authors":"Marwan S. Jameel, Oguz Yayla","doi":"10.1109/UBMK52708.2021.9559004","DOIUrl":"https://doi.org/10.1109/UBMK52708.2021.9559004","url":null,"abstract":"Implementing blockchain systems with less amount of decentralized computation power is a challenging task. One of the most essential solution in scaling the blockchain is selection of a trusted committee (TC). We intend to develop and apply a new method for selecting committee members depending on their reputation via particle swarm optimization (PSO) based update of the behavior of nodes. Indeed, this is the same concept as accumulating participants in the blockchain throughout the previous rounds of the consensus procedure.","PeriodicalId":106516,"journal":{"name":"2021 6th International Conference on Computer Science and Engineering (UBMK)","volume":"93 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129390336","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Comparative Evaluation of AMQP, MQTT and HTTP Protocols Using Real-Time Public Smart City Data 基于实时公共智慧城市数据的AMQP、MQTT和HTTP协议的比较评估
Pub Date : 2021-09-15 DOI: 10.1109/UBMK52708.2021.9559032
Cavide Balkı Gemirter, Çağatay Şenturca, S. Baydere
MQTT, AMQP and HTTP are messaging protocols that are commonly used for communicating with resource-constrained IoT devices. HTTP is the standard reference protocol for the REST transportation based on the request/response model, whereas both AMQP and MQTT are message-oriented protocols that use the publish/subscribe model. Message-oriented protocols enhance some of the shortcomings of the complex HTTP protocol by using asynchronous communication, changing the design from a document-centric to a data-centric approach and decreasing the header and message sizes. Although significant technical detail is present on these protocols, their real-time performance is insufficiently elaborated. In this paper, we present an experimental evaluation of these protocols conducted in a homogeneous IoT testbed using a real-time Smart City public data set. We provide the behavioral differences between messaging-based protocols and the REST-based HTTP protocol in terms of message latency and CPU usage for varying traffic loads and message sizes. The results showed that MQTT and AMQP are four times faster than HTTP protocol when comparing the message sent latencies. HTTP uses four times more CPU than the AMQP and MQTT protocols. In summary, message-oriented protocols give more stable and improved results as compared to the REST model-based HTTP protocol for all evaluation scenarios.
MQTT、AMQP和HTTP是通常用于与资源受限的物联网设备通信的消息传递协议。HTTP是基于请求/响应模型的REST传输的标准参考协议,而AMQP和MQTT都是使用发布/订阅模型的面向消息的协议。面向消息的协议通过使用异步通信,将设计从以文档为中心更改为以数据为中心,并减少报头和消息大小,从而增强了复杂HTTP协议的一些缺点。虽然这些协议有重要的技术细节,但它们的实时性能没有得到充分的阐述。在本文中,我们使用实时智慧城市公共数据集,在同构物联网测试平台上对这些协议进行了实验评估。我们提供了基于消息的协议和基于rest的HTTP协议在不同流量负载和消息大小的消息延迟和CPU使用方面的行为差异。结果表明,在比较消息发送延迟时,MQTT和AMQP比HTTP协议快4倍。HTTP使用的CPU是AMQP和MQTT协议的四倍。总之,对于所有评估场景,与基于REST模型的HTTP协议相比,面向消息的协议提供了更稳定和改进的结果。
{"title":"A Comparative Evaluation of AMQP, MQTT and HTTP Protocols Using Real-Time Public Smart City Data","authors":"Cavide Balkı Gemirter, Çağatay Şenturca, S. Baydere","doi":"10.1109/UBMK52708.2021.9559032","DOIUrl":"https://doi.org/10.1109/UBMK52708.2021.9559032","url":null,"abstract":"MQTT, AMQP and HTTP are messaging protocols that are commonly used for communicating with resource-constrained IoT devices. HTTP is the standard reference protocol for the REST transportation based on the request/response model, whereas both AMQP and MQTT are message-oriented protocols that use the publish/subscribe model. Message-oriented protocols enhance some of the shortcomings of the complex HTTP protocol by using asynchronous communication, changing the design from a document-centric to a data-centric approach and decreasing the header and message sizes. Although significant technical detail is present on these protocols, their real-time performance is insufficiently elaborated. In this paper, we present an experimental evaluation of these protocols conducted in a homogeneous IoT testbed using a real-time Smart City public data set. We provide the behavioral differences between messaging-based protocols and the REST-based HTTP protocol in terms of message latency and CPU usage for varying traffic loads and message sizes. The results showed that MQTT and AMQP are four times faster than HTTP protocol when comparing the message sent latencies. HTTP uses four times more CPU than the AMQP and MQTT protocols. In summary, message-oriented protocols give more stable and improved results as compared to the REST model-based HTTP protocol for all evaluation scenarios.","PeriodicalId":106516,"journal":{"name":"2021 6th International Conference on Computer Science and Engineering (UBMK)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121945733","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
A Review on Artificial Intelligence and Cyber Security 人工智能与网络安全综述
Pub Date : 2021-09-15 DOI: 10.1109/UBMK52708.2021.9558949
A. Okutan, Can Eyüpoğlu
Cyber attacks are carried out by unauthorized access to a system connected to an internet network anywhere in the world or by taking control of this system. These attacks continue to increase exponentially with the introduction of artificial intelligence technology, which has been used effectively in the field of science and engineering. With the use of artificial intelligence in the cyber field, conventional cyber attacks have begun to emerge as smart cyber attacks. Software development with traditional algorithms is insufficient to defend against attacks. In this study, studies in the literature on artificial intelligence methods used in the field of cyber security were examined. On the subjects discussed from different perspectives, solutions in terms of defense and attack, the applications used, the contexts between different disciplines, analyzes and examples on the basis of countries will be presented.
网络攻击是通过未经授权访问连接到世界任何地方的互联网网络的系统或通过控制该系统进行的。随着人工智能技术在科学和工程领域的有效应用,这些攻击继续呈指数级增长。随着人工智能在网络领域的应用,传统的网络攻击开始以智能网络攻击的形式出现。使用传统算法开发软件不足以抵御攻击。在本研究中,对人工智能方法在网络安全领域的应用进行了文献研究。关于从不同角度讨论的主题,在防御和攻击方面的解决方案,使用的应用程序,不同学科之间的背景,分析和国家的基础上的例子将被提出。
{"title":"A Review on Artificial Intelligence and Cyber Security","authors":"A. Okutan, Can Eyüpoğlu","doi":"10.1109/UBMK52708.2021.9558949","DOIUrl":"https://doi.org/10.1109/UBMK52708.2021.9558949","url":null,"abstract":"Cyber attacks are carried out by unauthorized access to a system connected to an internet network anywhere in the world or by taking control of this system. These attacks continue to increase exponentially with the introduction of artificial intelligence technology, which has been used effectively in the field of science and engineering. With the use of artificial intelligence in the cyber field, conventional cyber attacks have begun to emerge as smart cyber attacks. Software development with traditional algorithms is insufficient to defend against attacks. In this study, studies in the literature on artificial intelligence methods used in the field of cyber security were examined. On the subjects discussed from different perspectives, solutions in terms of defense and attack, the applications used, the contexts between different disciplines, analyzes and examples on the basis of countries will be presented.","PeriodicalId":106516,"journal":{"name":"2021 6th International Conference on Computer Science and Engineering (UBMK)","volume":"97 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127027758","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Apk2Img4AndMal: Android Malware Detection Framework Based on Convolutional Neural Network Apk2Img4AndMal:基于卷积神经网络的Android恶意软件检测框架
Pub Date : 2021-09-15 DOI: 10.1109/UBMK52708.2021.9558983
Oğuz Emre Kural, Durmuş Özkan Şahin, S. Akleylek, E. Kılıç, Murat Ömüral
In this study, the Apk2Img4AndMal framework, which provides information about the application without the need for static or dynamic attributes, is recommended. The proposed framework reads APK files in binary format and converts them to grayscale images. In the classification phase of the framework, the convolutional neural network (CNN) is used, which gives successful results in image classification. In this way, the required features are obtained through a CNN. Therefore, there is also no feature extraction phase as other dynamic or static analysis-based frameworks. This property is the most important advantage of the Apk2Img4AndMal framework. The proposed framework is tested with 24588 Android malware and 3000 benign applications. The highest performance achieved in the study is up to 94%, according to the accuracy metric.
在本研究中,推荐使用Apk2Img4AndMal框架,它提供了有关应用程序的信息,而不需要静态或动态属性。该框架以二进制格式读取APK文件,并将其转换为灰度图像。在框架的分类阶段,使用了卷积神经网络(CNN),在图像分类中取得了成功的结果。这样,通过一个CNN就可以得到所需要的特征。因此,也没有像其他基于动态或静态分析的框架那样的特征提取阶段。这个属性是Apk2Img4AndMal框架最重要的优势。该框架在24588个Android恶意软件和3000个良性应用程序中进行了测试。根据准确度指标,研究中达到的最高性能高达94%。
{"title":"Apk2Img4AndMal: Android Malware Detection Framework Based on Convolutional Neural Network","authors":"Oğuz Emre Kural, Durmuş Özkan Şahin, S. Akleylek, E. Kılıç, Murat Ömüral","doi":"10.1109/UBMK52708.2021.9558983","DOIUrl":"https://doi.org/10.1109/UBMK52708.2021.9558983","url":null,"abstract":"In this study, the Apk2Img4AndMal framework, which provides information about the application without the need for static or dynamic attributes, is recommended. The proposed framework reads APK files in binary format and converts them to grayscale images. In the classification phase of the framework, the convolutional neural network (CNN) is used, which gives successful results in image classification. In this way, the required features are obtained through a CNN. Therefore, there is also no feature extraction phase as other dynamic or static analysis-based frameworks. This property is the most important advantage of the Apk2Img4AndMal framework. The proposed framework is tested with 24588 Android malware and 3000 benign applications. The highest performance achieved in the study is up to 94%, according to the accuracy metric.","PeriodicalId":106516,"journal":{"name":"2021 6th International Conference on Computer Science and Engineering (UBMK)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124099710","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
An Improved Hybrid Genetic Algorithm for the Quadratic Assignment Problem 二次分配问题的改进混合遗传算法
Pub Date : 2021-09-15 DOI: 10.1109/UBMK52708.2021.9558978
Şeyda Melis Türkkahraman, Dindar Öz
The quadratic assignment problem (QAP) is a well-known optimization problem that has many applications in various engineering areas. Due to its NP-hard nature, rather than the exact methods, heuristic and metaheuristic approaches are commonly adapted. In this study, we propose an improved hybrid genetic algorithm which mainly combines a greedy heuristic, and a simulated annealing algorithm with the classical genetic algorithm. We test our algorithm on the well-known benchmark for the QAP and compare the results with four different algorithms: a greedy algorithm, simulated annealing algorithm (SA), demon algorithm (DA), and a classical genetic algorithm (GA). The results of the experiments validate that our hybridization significantly improves the performance of the algorithms comparing to their standalone executions.
二次分配问题(QAP)是一个众所周知的优化问题,在各个工程领域都有广泛的应用。由于其NP-hard性质,而不是确切的方法,启发式和元启发式方法通常被采用。本文提出了一种改进的混合遗传算法,主要将贪心启发式算法和模拟退火算法与经典遗传算法相结合。我们在著名的QAP基准上测试了我们的算法,并将结果与四种不同的算法进行了比较:贪心算法、模拟退火算法(SA)、恶魔算法(DA)和经典遗传算法(GA)。实验结果证明,与单独执行相比,我们的杂交显著提高了算法的性能。
{"title":"An Improved Hybrid Genetic Algorithm for the Quadratic Assignment Problem","authors":"Şeyda Melis Türkkahraman, Dindar Öz","doi":"10.1109/UBMK52708.2021.9558978","DOIUrl":"https://doi.org/10.1109/UBMK52708.2021.9558978","url":null,"abstract":"The quadratic assignment problem (QAP) is a well-known optimization problem that has many applications in various engineering areas. Due to its NP-hard nature, rather than the exact methods, heuristic and metaheuristic approaches are commonly adapted. In this study, we propose an improved hybrid genetic algorithm which mainly combines a greedy heuristic, and a simulated annealing algorithm with the classical genetic algorithm. We test our algorithm on the well-known benchmark for the QAP and compare the results with four different algorithms: a greedy algorithm, simulated annealing algorithm (SA), demon algorithm (DA), and a classical genetic algorithm (GA). The results of the experiments validate that our hybridization significantly improves the performance of the algorithms comparing to their standalone executions.","PeriodicalId":106516,"journal":{"name":"2021 6th International Conference on Computer Science and Engineering (UBMK)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127568034","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Keystroke Dynamics Based Authentication System 基于击键动力学的认证系统
Pub Date : 2021-09-15 DOI: 10.1109/UBMK52708.2021.9559008
Nurşah Çevi̇k, S. Akleylek, Kadir Koc
Nowadays, many companies use biometric technologies for the security of critical systems as well as username-password methods. In the literature, biometric systems are the most commonly used systems among the two-factor authentication systems. There are two different approaches to biometric systems: physical and behavioral biometric systems. In the last decade, the accuracy of behavioral biometric systems has significantly increased with the use of machine learning methods in these systems. For this reason, the usage areas of the studies in this field have expanded. In this study, we focus on keystroke dynamics based on behavioral methods. Firstly, we make a web application to collect keystroke data from 54 employees in a company. Then, we use the benchmark database and our database to train-test machine learning algorithms, which have the highest accuracy in this field in the literature. Among them, tree-based algorithms have the highest accuracy score, with an average of 0.94.
如今,许多公司使用生物识别技术来保护关键系统的安全,以及用户名-密码方法。在文献中,生物识别系统是双因素认证系统中最常用的系统。生物识别系统有两种不同的方法:物理生物识别系统和行为生物识别系统。在过去的十年中,随着机器学习方法在这些系统中的使用,行为生物识别系统的准确性显著提高。因此,这一领域的研究的应用领域不断扩大。在本研究中,我们重点研究基于行为方法的击键动力学。首先,我们制作了一个web应用程序来收集某公司54名员工的击键数据。然后,我们使用基准数据库和我们的数据库对机器学习算法进行训练测试,这是目前文献中该领域准确率最高的算法。其中,基于树的算法准确率最高,平均为0.94。
{"title":"Keystroke Dynamics Based Authentication System","authors":"Nurşah Çevi̇k, S. Akleylek, Kadir Koc","doi":"10.1109/UBMK52708.2021.9559008","DOIUrl":"https://doi.org/10.1109/UBMK52708.2021.9559008","url":null,"abstract":"Nowadays, many companies use biometric technologies for the security of critical systems as well as username-password methods. In the literature, biometric systems are the most commonly used systems among the two-factor authentication systems. There are two different approaches to biometric systems: physical and behavioral biometric systems. In the last decade, the accuracy of behavioral biometric systems has significantly increased with the use of machine learning methods in these systems. For this reason, the usage areas of the studies in this field have expanded. In this study, we focus on keystroke dynamics based on behavioral methods. Firstly, we make a web application to collect keystroke data from 54 employees in a company. Then, we use the benchmark database and our database to train-test machine learning algorithms, which have the highest accuracy in this field in the literature. Among them, tree-based algorithms have the highest accuracy score, with an average of 0.94.","PeriodicalId":106516,"journal":{"name":"2021 6th International Conference on Computer Science and Engineering (UBMK)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127461707","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Analysis of RepVGG on Small Sized Dandelion Images Dataset in terms of Transfer Learning, Regularization, Spatial Attention as well as Squeeze and Excitation Blocks 基于小型蒲公英图像数据集的RepVGG迁移学习、正则化、空间注意、挤压块和激励块分析
Pub Date : 2021-09-15 DOI: 10.1109/UBMK52708.2021.9558941
M. Nergiz
The automated weed detection is an important research field in terms of agricultural productivity and economy. This study aims to apply RepVGG which is a new deep learning architecture developed on PyTorch framework and has promising results when trained and tested on ImageNet1K dataset. 920 images of the small sized Dandelion Images dataset is used for this study. Pretrained vanilla, pretrained and dropout regularized, squeeze and excitation block added and spatial attention block added versions of RepVGG are tested on the dataset. VGG16 method is also applied to the dataset and the results of the MobileNetV2 method is taken from the Kaggle Competition to get an insight about the baseline results of the classical state of the art models. The proposed RepVGG modifications could not outperform the state of the art methods on this dataset but the effect of the modifications are deeply analyzed and the best configuration is obtained by Squeeze and Excitation block added RepVGG-A0 architecture which is trained from scratch for 5 epochs and provided results of 0,875, 0,665, 0,89 and 0,74 for Accuracy, Recall, Precision and F1 metrics respectively.
杂草自动检测是农业生产力和经济发展的重要研究领域。RepVGG是在PyTorch框架上开发的一种新的深度学习架构,在ImageNet1K数据集上进行了训练和测试,取得了良好的效果。本研究使用了小型Dandelion images数据集的920张图像。在数据集上测试了预训练vanilla、预训练dropout正则化、添加挤压激励块和添加空间注意块的RepVGG版本。VGG16方法也应用于数据集,MobileNetV2方法的结果取自Kaggle竞赛,以深入了解经典最先进模型的基线结果。在此数据集上,所提出的RepVGG修改不能优于当前最先进的方法,但对修改的效果进行了深入分析,并通过添加了Squeeze和Excitation块的RepVGG- a0架构获得了最佳配置,该架构从零开始训练了5个epoch,在准确率、召回率、精度和F1指标上分别获得了0,875、0,665、0,89和0,74的结果。
{"title":"Analysis of RepVGG on Small Sized Dandelion Images Dataset in terms of Transfer Learning, Regularization, Spatial Attention as well as Squeeze and Excitation Blocks","authors":"M. Nergiz","doi":"10.1109/UBMK52708.2021.9558941","DOIUrl":"https://doi.org/10.1109/UBMK52708.2021.9558941","url":null,"abstract":"The automated weed detection is an important research field in terms of agricultural productivity and economy. This study aims to apply RepVGG which is a new deep learning architecture developed on PyTorch framework and has promising results when trained and tested on ImageNet1K dataset. 920 images of the small sized Dandelion Images dataset is used for this study. Pretrained vanilla, pretrained and dropout regularized, squeeze and excitation block added and spatial attention block added versions of RepVGG are tested on the dataset. VGG16 method is also applied to the dataset and the results of the MobileNetV2 method is taken from the Kaggle Competition to get an insight about the baseline results of the classical state of the art models. The proposed RepVGG modifications could not outperform the state of the art methods on this dataset but the effect of the modifications are deeply analyzed and the best configuration is obtained by Squeeze and Excitation block added RepVGG-A0 architecture which is trained from scratch for 5 epochs and provided results of 0,875, 0,665, 0,89 and 0,74 for Accuracy, Recall, Precision and F1 metrics respectively.","PeriodicalId":106516,"journal":{"name":"2021 6th International Conference on Computer Science and Engineering (UBMK)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130812776","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Random Subspace Based Approach for Stress Classification from Smartphone Data 基于随机子空间的智能手机应力分类方法
Pub Date : 2021-09-15 DOI: 10.1109/UBMK52708.2021.9558896
Ensar Arif Sağbaş, Serdar Çorukoğlu, Serkan Balli
Stress is an important problem to deal with in today’s society. Thanks to the built-in sensors of smartphones, many operations can be performed unobtrusively. Accordingly, smartphones are among the indispensable data sources of research subjects. In this study, the problem of stress classification was discussed with the data obtained from smartphones. Sensor data were collected to examine users’ writing behavior. The features extracted from the obtained raw data were classified with the random subspace-based structures and their performances were compared. As a result of the study, it was observed that the stacking method showed promising results.
压力是当今社会需要解决的一个重要问题。多亏了智能手机内置的传感器,许多操作都可以在不显眼的情况下进行。因此,智能手机是研究对象不可或缺的数据来源之一。在本研究中,我们利用智能手机上的数据来讨论压力分类问题。收集传感器数据来检查用户的写作行为。将原始数据提取的特征与基于随机子空间的结构进行分类,并对其性能进行比较。研究结果表明,叠层法具有良好的效果。
{"title":"A Random Subspace Based Approach for Stress Classification from Smartphone Data","authors":"Ensar Arif Sağbaş, Serdar Çorukoğlu, Serkan Balli","doi":"10.1109/UBMK52708.2021.9558896","DOIUrl":"https://doi.org/10.1109/UBMK52708.2021.9558896","url":null,"abstract":"Stress is an important problem to deal with in today’s society. Thanks to the built-in sensors of smartphones, many operations can be performed unobtrusively. Accordingly, smartphones are among the indispensable data sources of research subjects. In this study, the problem of stress classification was discussed with the data obtained from smartphones. Sensor data were collected to examine users’ writing behavior. The features extracted from the obtained raw data were classified with the random subspace-based structures and their performances were compared. As a result of the study, it was observed that the stacking method showed promising results.","PeriodicalId":106516,"journal":{"name":"2021 6th International Conference on Computer Science and Engineering (UBMK)","volume":"94 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131025747","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A New Approach to Use Modern Object Detection Methods More Efficiently on CCTV Systems 在闭路电视系统中更有效地利用现代目标检测方法的新途径
Pub Date : 2021-09-15 DOI: 10.1109/UBMK52708.2021.9558899
Oguzhan Can, Sezai Burak Kantarci, Gozde Unal
DL architectures rely on extensive usage on powerful computer systems to operate in real-time. Therefore, cooperative and constructive optimizations should be made in both architecture and software parts of the related DL system. In this work, input system of the YOLO architecture is modified to accept several sources at the same time with two effective methods to increase the efficiency of the hardware system. First method is to design a scheduler which will allow YOLO architecture to process several input sources sequentially, allowing the architecture to use its full potential. Second method is to design a preprocessing algorithm to combine 4 or 9 input sources in a single input source as a 2x2 or 3x3 image matrix. In this way, YOLO architecture processes four or nine times more images in the same time, increasing its practical frame per second (FPS) value by four or nine folds. Experiment results on our machine show that the used YOLO architecture can process 3 input sources at the same time with only minimal loss of accuracy of 0.002 in terms of Mean Average Precision (mAP) while using the proposed scheduler. Additionally, using 4 inputs combined increases the practical FPS value from 31 to 120 and using 9 inputs increases the practical FPS value from 13 to 108, all while decreasing the mAP value by only 0.008 for 4 inputs and by only 0.034 for 9 inputs. Considering the obtained FPS values and achieved hardware efficiency, these minimal losses of mAP are easily acceptable.
深度学习体系结构依赖于强大的计算机系统的广泛使用来实现实时操作。因此,应该在相关DL系统的架构和软件部分进行协作性和建设性的优化。本文采用两种有效的方法对YOLO体系结构的输入系统进行修改,使其可以同时接受多个输入源,从而提高硬件系统的效率。第一种方法是设计一个调度器,允许YOLO体系结构按顺序处理多个输入源,从而允许体系结构充分发挥其潜力。第二种方法是设计预处理算法,将单个输入源中的4个或9个输入源组合成2x2或3x3图像矩阵。这样,YOLO架构在同一时间内处理的图像数量增加了4到9倍,其实际帧数每秒(FPS)值提高了4到9倍。在我们的机器上的实验结果表明,所使用的YOLO架构可以同时处理3个输入源,在使用所提出的调度器时,平均平均精度(mAP)的精度损失仅为0.002。此外,使用4个输入组合将实际FPS值从31增加到120,使用9个输入将实际FPS值从13增加到108,同时4个输入仅减少0.008,9个输入仅减少0.034。考虑到获得的FPS值和实现的硬件效率,这些最小的mAP损失是可以接受的。
{"title":"A New Approach to Use Modern Object Detection Methods More Efficiently on CCTV Systems","authors":"Oguzhan Can, Sezai Burak Kantarci, Gozde Unal","doi":"10.1109/UBMK52708.2021.9558899","DOIUrl":"https://doi.org/10.1109/UBMK52708.2021.9558899","url":null,"abstract":"DL architectures rely on extensive usage on powerful computer systems to operate in real-time. Therefore, cooperative and constructive optimizations should be made in both architecture and software parts of the related DL system. In this work, input system of the YOLO architecture is modified to accept several sources at the same time with two effective methods to increase the efficiency of the hardware system. First method is to design a scheduler which will allow YOLO architecture to process several input sources sequentially, allowing the architecture to use its full potential. Second method is to design a preprocessing algorithm to combine 4 or 9 input sources in a single input source as a 2x2 or 3x3 image matrix. In this way, YOLO architecture processes four or nine times more images in the same time, increasing its practical frame per second (FPS) value by four or nine folds. Experiment results on our machine show that the used YOLO architecture can process 3 input sources at the same time with only minimal loss of accuracy of 0.002 in terms of Mean Average Precision (mAP) while using the proposed scheduler. Additionally, using 4 inputs combined increases the practical FPS value from 31 to 120 and using 9 inputs increases the practical FPS value from 13 to 108, all while decreasing the mAP value by only 0.008 for 4 inputs and by only 0.034 for 9 inputs. Considering the obtained FPS values and achieved hardware efficiency, these minimal losses of mAP are easily acceptable.","PeriodicalId":106516,"journal":{"name":"2021 6th International Conference on Computer Science and Engineering (UBMK)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128314310","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2021 6th International Conference on Computer Science and Engineering (UBMK)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1