首页 > 最新文献

Indonesian Journal of Electrical Engineering and Informatics (IJEEI)最新文献

英文 中文
Voltage Rise Problem in Distribution Networks with Distributed Generation: A Review of Technologies, Impact and Mitigation Approaches 分布式发电配电网电压上升问题:技术、影响和缓解方法综述
Pub Date : 2021-08-31 DOI: 10.52549/.v9i3.2971
K. Makinde, D. Akinyele, A. O. Amole
{"title":"Voltage Rise Problem in Distribution Networks with Distributed Generation: A Review of Technologies, Impact and Mitigation Approaches","authors":"K. Makinde, D. Akinyele, A. O. Amole","doi":"10.52549/.v9i3.2971","DOIUrl":"https://doi.org/10.52549/.v9i3.2971","url":null,"abstract":"","PeriodicalId":13516,"journal":{"name":"Indonesian Journal of Electrical Engineering and Informatics (IJEEI)","volume":"75 1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77386410","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Development of a Low-Cost Wireless Bee-Hive Temperature and Sound Monitoring System 一种低成本无线蜂窝温度和声音监测系统的研制
Pub Date : 2020-08-17 DOI: 10.11591/IJEEI.V8I3.2268
A. Imoize, Samuel Damilola Odeyemi, J. Adebisi
Precision beekeeping requires data acquisition, data analysis, and applications where the initial phase data on the beehive plays a fundamental role. This method of apiculture could be used to measure different bee colony parameters in real time, leveraging on wireless sensing technologies, which aid monitoring of a bee colony, and enhances the monitoring of infectious diseases like colony collapse disorder–a major loss in the management of honey bee population. In this paper, a low-cost wireless technology-based system, which measures in real-time, the temperature in and around the beehive, and the sound intensity inside the hive is presented. This monitoring system is developed using an Arduino microprocessor, an ESP8266 communication module, and a web-based server. The proposed system provides valuable information concerning the bee colony behavior in terms of temperature variations and sound characteristics. Based on the measured temperature and sound information, colony beekeepers could easily detect events like increased food usage by the bees, breeding start time, pre-swarming action, actual swarming pattern, and the bee colony's death.
精密养蜂需要数据采集,数据分析和应用,其中蜂巢的初始阶段数据起着基本作用。这种养蜂方法可以用来实时测量不同的蜂群参数,利用无线传感技术,这有助于监测蜂群,并加强对蜂群衰竭失调等传染病的监测,蜂群衰竭失调是蜜蜂种群管理的主要损失。本文提出了一种基于无线技术的低成本实时测量蜂箱内及周围温度和蜂箱内声强的系统。该监控系统采用Arduino微处理器、ESP8266通信模块和基于web的服务器开发。该系统在温度变化和声音特征方面提供了有关蜂群行为的有价值的信息。根据测得的温度和声音信息,蜂群养蜂人可以很容易地检测到诸如蜜蜂食物使用量增加、繁殖开始时间、蜂群前行动、实际蜂群模式和蜂群死亡等事件。
{"title":"Development of a Low-Cost Wireless Bee-Hive Temperature and Sound\u0000 Monitoring System","authors":"A. Imoize, Samuel Damilola Odeyemi, J. Adebisi","doi":"10.11591/IJEEI.V8I3.2268","DOIUrl":"https://doi.org/10.11591/IJEEI.V8I3.2268","url":null,"abstract":"Precision beekeeping requires data acquisition, data analysis, and applications where the initial phase data on the beehive plays a fundamental role. This method of apiculture could be used to measure different bee colony parameters in real time, leveraging on wireless sensing technologies, which aid monitoring of a bee colony, and enhances the monitoring of infectious diseases like colony collapse disorder–a major loss in the management of honey bee population. In this paper, a low-cost wireless technology-based system, which measures in real-time, the temperature in and around the beehive, and the sound intensity inside the hive is presented. This monitoring system is developed using an Arduino microprocessor, an ESP8266 communication module, and a web-based server. The proposed system provides valuable information concerning the bee colony behavior in terms of temperature variations and sound characteristics. Based on the measured temperature and sound information, colony beekeepers could easily detect events like increased food usage by the bees, breeding start time, pre-swarming action, actual swarming pattern, and the bee colony's death.","PeriodicalId":13516,"journal":{"name":"Indonesian Journal of Electrical Engineering and Informatics (IJEEI)","volume":"42 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85752584","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Implementation of Deep Learning Based Method for Optimizing Spatial Diversity MIMO Communication 基于深度学习的空间分集MIMO通信优化方法的实现
Pub Date : 2020-06-30 DOI: 10.11591/IJEEI.V8I2.1247
Mahdin Rohmatillah, S. Pramono, Rifa Atul Izza Asyari
As an alternative solution of the isuue trade-off phenomenon between performance and computational complexity always become the hugest dilemma suffered by researchers, this research proposes an optimization in spatial diversity MIMO communication system using end-to-end learning based model, specifically, it adapts autoencoder model. Two models are introduced in this research which each of them address a problem about data detection task and channel estimation task that has not been addressed in the previous research. The proposed models were evaluated in one of the most common channel impairment which is Rayleigh fading with additional Additive White Gaussian Noise (AWGN) and compared to the standard Alamouti scheme. The results show that these deep learning based models for MIMO communication system result in very promising results by outperforming the baseline methods. In perfect CSIR (Channel State Information in Receiver side) case, the proposed models achieve BER nearly  at SNR 22.5 dB. While in channel estimation case, the proposed models can exceed the baseline performance even by only transmitting 2 pilots.
为了解决性能和计算复杂度之间的权衡问题,本研究提出了一种基于端到端学习模型的空间分集MIMO通信系统优化方法,该方法采用自编码器模型。本研究引入了两个模型,分别解决了以往研究中没有解决的数据检测任务和信道估计任务问题。在最常见的信道损伤之一——附加加性高斯白噪声(AWGN)的瑞利衰落中对所提出的模型进行了评估,并与标准Alamouti方案进行了比较。结果表明,这些基于深度学习的MIMO通信系统模型优于基线方法,结果非常有希望。在理想的CSIR(信道状态信息接收端)情况下,所提模型的误码率接近22.5 dB。而在信道估计情况下,即使只发送2个导频,所提出的模型也能超过基线性能。
{"title":"Implementation of Deep Learning Based Method for Optimizing Spatial\u0000 Diversity MIMO Communication","authors":"Mahdin Rohmatillah, S. Pramono, Rifa Atul Izza Asyari","doi":"10.11591/IJEEI.V8I2.1247","DOIUrl":"https://doi.org/10.11591/IJEEI.V8I2.1247","url":null,"abstract":"As an alternative solution of the isuue trade-off phenomenon between performance and computational complexity always become the hugest dilemma suffered by researchers, this research proposes an optimization in spatial diversity MIMO communication system using end-to-end learning based model, specifically, it adapts autoencoder model. Two models are introduced in this research which each of them address a problem about data detection task and channel estimation task that has not been addressed in the previous research. The proposed models were evaluated in one of the most common channel impairment which is Rayleigh fading with additional Additive White Gaussian Noise (AWGN) and compared to the standard Alamouti scheme. The results show that these deep learning based models for MIMO communication system result in very promising results by outperforming the baseline methods. In perfect CSIR (Channel State Information in Receiver side) case, the proposed models achieve BER nearly  at SNR 22.5 dB. While in channel estimation case, the proposed models can exceed the baseline performance even by only transmitting 2 pilots.","PeriodicalId":13516,"journal":{"name":"Indonesian Journal of Electrical Engineering and Informatics (IJEEI)","volume":"96 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85555889","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Web Application Reinforcement via Efficient Systematic Analysis and Runtime Validation (ESARV) 通过有效的系统分析和运行时验证(ESARV)加强Web应用程序
Pub Date : 2020-05-17 DOI: 10.11591/IJEEI.V8I2.1107
Z. Lashkaripour
Securing the data, a fundamental asset in an organization, against SQL Injection (SQLI), the most frequent attack in web applications, is vital. In SQLI, an attacker alters the structure of the actual query by injecting code via the input, and gaining access to the database. This paper proposes a new method for securing web applications against SQLI Attacks (SQLIAs). It contains two phases based on systematic analysis and runtime validation and uses our new technique for detection and prevention. At the static phase, our method removes user inputs from SQL queries and gathers as much information as possible, from static and dynamic queries in order to minimize the overhead at runtime. On the other hand, at the dynamic phase, the prepared information alongside our technique are used to check the validity of the runtime query. To facilitate the usage of our method and show our expectations in practice, ESARV was implemented. The empirical evaluations demonstrated in this paper, indicate that ESARV is efficient, accurate, effective, and also has no deployment requirements.
保护数据(组织中的基本资产)免受SQL注入(SQL Injection, web应用程序中最常见的攻击)的侵害至关重要。在SQLI中,攻击者通过输入注入代码来改变实际查询的结构,并获得对数据库的访问权。本文提出了一种保护web应用程序免受sql攻击(sqlia)的新方法。它包含基于系统分析和运行时验证的两个阶段,并使用我们的新技术进行检测和预防。在静态阶段,我们的方法从SQL查询中删除用户输入,并从静态和动态查询中收集尽可能多的信息,以便最小化运行时的开销。另一方面,在动态阶段,准备好的信息与我们的技术一起用于检查运行时查询的有效性。为了方便我们的方法的使用,并在实践中体现我们的期望,我们实现了ESARV。本文的实证评价结果表明,ESARV具有高效、准确、有效、无部署需求的特点。
{"title":"Web Application Reinforcement via Efficient Systematic Analysis and\u0000 Runtime Validation (ESARV)","authors":"Z. Lashkaripour","doi":"10.11591/IJEEI.V8I2.1107","DOIUrl":"https://doi.org/10.11591/IJEEI.V8I2.1107","url":null,"abstract":"Securing the data, a fundamental asset in an organization, against SQL Injection (SQLI), the most frequent attack in web applications, is vital. In SQLI, an attacker alters the structure of the actual query by injecting code via the input, and gaining access to the database. This paper proposes a new method for securing web applications against SQLI Attacks (SQLIAs). It contains two phases based on systematic analysis and runtime validation and uses our new technique for detection and prevention. At the static phase, our method removes user inputs from SQL queries and gathers as much information as possible, from static and dynamic queries in order to minimize the overhead at runtime. On the other hand, at the dynamic phase, the prepared information alongside our technique are used to check the validity of the runtime query. To facilitate the usage of our method and show our expectations in practice, ESARV was implemented. The empirical evaluations demonstrated in this paper, indicate that ESARV is efficient, accurate, effective, and also has no deployment requirements.","PeriodicalId":13516,"journal":{"name":"Indonesian Journal of Electrical Engineering and Informatics (IJEEI)","volume":"49 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-05-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78513719","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Comprehensive Insight into Game Theory in relevance to Cyber Security 全面洞察博弈论与网络安全的关系
Pub Date : 2020-03-11 DOI: 10.11591/IJEEI.V8I1.1810
F. Anwar, B. Khan, R. F. Olanrewaju, Bisma Rasool Pampori, R. N. Mir
The progressively ubiquitous connectivity in the present information systems pose newer challenges tosecurity. The conventional security mechanisms have come a long way in securing the well-definedobjectives of confidentiality, integrity, authenticity and availability. Nevertheless, with the growth in thesystem complexities and attack sophistication, providing security via traditional means can beunaffordable. A novel theoretical perspective and an innovative approach are thus required forunderstanding security from decision-making and strategic viewpoint. One of the analytical tools whichmay assist the researchers in designing security protocols for computer networks is game theory. Thegame-theoretic concept finds extensive applications in security at different levels, including thecyberspace and is generally categorized under security games. It can be utilized as a robust mathematicaltool for modelling and analyzing contemporary security issues. Game theory offers a natural frameworkfor capturing the defensive as well as adversarial interactions between the defenders and the attackers.Furthermore, defenders can attain a deep understanding of the potential attack threats and the strategiesof attackers by equilibrium evaluation of the security games. In this paper, the concept of game theoryhas been presented, followed by game-theoretic applications in cybersecurity including cryptography.Different types of games, particularly those focused on securing the cyberspace, have been analysed andvaried game-theoretic methodologies including mechanism design theories have been outlined foroffering a modern foundation of the science of cybersecurity.
在当今的信息系统中,日益无处不在的连接对安全提出了新的挑战。传统的安全机制在确保机密性、完整性、真实性和可用性等明确目标方面取得了长足的进步。然而,随着系统复杂性和攻击复杂性的增长,通过传统手段提供安全性可能是无法承受的。因此,从决策和战略的角度来理解安全需要一个新的理论视角和创新的方法。博弈论是可以帮助研究人员设计计算机网络安全协议的分析工具之一。博弈论概念在包括网络空间在内的各个层面的安全中都有广泛的应用,通常被归类为安全博弈。它可以作为一个强大的数学工具来建模和分析当代安全问题。博弈论为捕获防御者和攻击者之间的防御和对抗互动提供了一个自然的框架。此外,防御者可以通过对安全博弈的均衡评估,深入了解潜在的攻击威胁和攻击者的策略。本文首先介绍了博弈论的概念,然后介绍了博弈论在包括密码学在内的网络安全中的应用。本文分析了不同类型的游戏,特别是那些关注网络空间安全的游戏,并概述了包括机制设计理论在内的各种博弈论方法,为网络安全科学提供了现代基础。
{"title":"A Comprehensive Insight into Game Theory in relevance to Cyber\u0000 Security","authors":"F. Anwar, B. Khan, R. F. Olanrewaju, Bisma Rasool Pampori, R. N. Mir","doi":"10.11591/IJEEI.V8I1.1810","DOIUrl":"https://doi.org/10.11591/IJEEI.V8I1.1810","url":null,"abstract":"The progressively ubiquitous connectivity in the present information systems pose newer challenges tosecurity. The conventional security mechanisms have come a long way in securing the well-definedobjectives of confidentiality, integrity, authenticity and availability. Nevertheless, with the growth in thesystem complexities and attack sophistication, providing security via traditional means can beunaffordable. A novel theoretical perspective and an innovative approach are thus required forunderstanding security from decision-making and strategic viewpoint. One of the analytical tools whichmay assist the researchers in designing security protocols for computer networks is game theory. Thegame-theoretic concept finds extensive applications in security at different levels, including thecyberspace and is generally categorized under security games. It can be utilized as a robust mathematicaltool for modelling and analyzing contemporary security issues. Game theory offers a natural frameworkfor capturing the defensive as well as adversarial interactions between the defenders and the attackers.Furthermore, defenders can attain a deep understanding of the potential attack threats and the strategiesof attackers by equilibrium evaluation of the security games. In this paper, the concept of game theoryhas been presented, followed by game-theoretic applications in cybersecurity including cryptography.Different types of games, particularly those focused on securing the cyberspace, have been analysed andvaried game-theoretic methodologies including mechanism design theories have been outlined foroffering a modern foundation of the science of cybersecurity.","PeriodicalId":13516,"journal":{"name":"Indonesian Journal of Electrical Engineering and Informatics (IJEEI)","volume":"41 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-03-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79396584","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Reducing Beat Frequency Oscillation in a Two-phase Sliding Mode-controlled Voltage Regulator Module 降低两相滑模控制稳压模块的拍频振荡
Pub Date : 2020-03-07 DOI: 10.11591/IJEEI.V8I1.1436
J. C. Magsino, E. Magsino
During static and dynamic loading conditions, voltage regulator modules (VRMs) are expected to provide regulated voltage with minimal ripple even at high current requirement.  Compared to regular power supplies, VRMs repetitively experience high-frequency loading conditions that is greatly dependent on the software running in the processor utilizing them. In the scenario that when the transient load frequency is near the VRM’s switching frequency, high-magnitude and low-frequency oscillations are observed at the phase currents.  This phenomenon is called the beat frequency oscillation.  In this study, the sliding mode control principle is employed to both the voltage and current share loops of the VRM to reduce the phase currents’ beat frequency oscillations. A fixed frequency sliding mode controller is derived and extensively evaluated using the PSIM simulator.  Our results show that while maintaining equal load sharing among VRMs at less than 5% sharing error and various types of loading conditions, the sliding mode controller can reduce the beat frequency oscillation phenomenon to 20 kHz at maximum with reduced peak current values.   The output voltage is also regulated within the desired ± 1.65% band.
在静态和动态负载条件下,电压调节器模块(VRMs)即使在高电流要求下也能提供最小纹波的稳压电压。与常规电源相比,vrm反复经历高频负载条件,这在很大程度上取决于使用它们的处理器中运行的软件。在暂态负载频率接近VRM开关频率的情况下,相电流处出现了高幅值和低频振荡。这种现象称为拍频振荡。本研究将滑模控制原理应用于VRM的电压分担环和电流分担环,以减小相电流的拍频振荡。推导了一种固定频率滑模控制器,并使用PSIM模拟器进行了广泛的评估。研究结果表明,在各种负载条件下,在共享误差小于5%的情况下,该滑模控制器可以在峰值电流值降低的情况下,将vrm之间的负载均匀共享,从而最大限度地减少抖频振荡现象至20 kHz。输出电压也可调节在所需的±1.65%范围内。
{"title":"Reducing Beat Frequency Oscillation in a Two-phase Sliding\u0000 Mode-controlled Voltage Regulator Module","authors":"J. C. Magsino, E. Magsino","doi":"10.11591/IJEEI.V8I1.1436","DOIUrl":"https://doi.org/10.11591/IJEEI.V8I1.1436","url":null,"abstract":"During static and dynamic loading conditions, voltage regulator modules (VRMs) are expected to provide regulated voltage with minimal ripple even at high current requirement.  Compared to regular power supplies, VRMs repetitively experience high-frequency loading conditions that is greatly dependent on the software running in the processor utilizing them. In the scenario that when the transient load frequency is near the VRM’s switching frequency, high-magnitude and low-frequency oscillations are observed at the phase currents.  This phenomenon is called the beat frequency oscillation.  In this study, the sliding mode control principle is employed to both the voltage and current share loops of the VRM to reduce the phase currents’ beat frequency oscillations. A fixed frequency sliding mode controller is derived and extensively evaluated using the PSIM simulator.  Our results show that while maintaining equal load sharing among VRMs at less than 5% sharing error and various types of loading conditions, the sliding mode controller can reduce the beat frequency oscillation phenomenon to 20 kHz at maximum with reduced peak current values.   The output voltage is also regulated within the desired ± 1.65% band.","PeriodicalId":13516,"journal":{"name":"Indonesian Journal of Electrical Engineering and Informatics (IJEEI)","volume":"9 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-03-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83894666","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Recognition of Badminton Action Using Convolutional Neural Network 基于卷积神经网络的羽毛球动作识别
Pub Date : 2019-11-18 DOI: 10.11591/IJEEI.V7I4.968
N. A. Rahmad, N. A. J. Sufri, M. A. As’ari, A. Azaman
Deep learning approach has becoming a research interest in action recognition application due to its ability to surpass the performance of conventional machine learning approaches. Convolutional Neural Network (CNN) is among the widely used architecture in most action recognition works. There are various models exist in CNN but no research has been done to analyse which model has the best performance in recognizing actions for badminton sport. Hence, in this paper we are comparing the performance of four different pre-trained models of deep CNN in classifying the badminton match images to recognize the different actions done by the athlete. Four models used for comparison are AlexNet, GoogleNet, VggNet-16 and VggNet-19. The images used in this experimental work are categorized into two classes: hit and non-hit action. Firstly, each image frame was extracted from Yonex All England Man Single Match 2017 broadcast video. Then, the image frames were fed as the input to each classifier model for classification. Finally, the performance of each classifier model was evaluated by plotting its performance accuracy in form of confusion matrix. The result shows that the GoogleNet model has the highest classification accuracy which is 87.5% compared to other models. In a conclusion, the pre-trained GoogleNet model is capable to be used in recognizing actions in badminton match which might be useful in badminton sport performance technology.
深度学习方法因其超越传统机器学习方法的性能而成为动作识别应用的研究热点。卷积神经网络(Convolutional Neural Network, CNN)是大多数动作识别工作中使用最广泛的架构之一。CNN中有各种各样的模型,但目前还没有研究分析哪种模型在羽毛球运动动作识别中表现最好。因此,在本文中,我们比较了四种不同的深度CNN预训练模型在羽毛球比赛图像分类中的表现,以识别运动员的不同动作。用于比较的四个模型是AlexNet、GoogleNet、VggNet-16和VggNet-19。实验中使用的图像分为两类:命中和非命中动作。首先,提取2017年Yonex全英男子单打比赛直播视频中的每一帧图像。然后,将图像帧作为输入输入到各个分类器模型中进行分类。最后,以混淆矩阵的形式对各分类器模型的性能精度进行评价。结果表明,与其他模型相比,GoogleNet模型的分类准确率最高,达到87.5%。综上所述,预训练的GoogleNet模型能够用于羽毛球比赛动作的识别,对羽毛球运动表演技术有一定的应用价值。
{"title":"Recognition of Badminton Action Using Convolutional Neural\u0000 Network","authors":"N. A. Rahmad, N. A. J. Sufri, M. A. As’ari, A. Azaman","doi":"10.11591/IJEEI.V7I4.968","DOIUrl":"https://doi.org/10.11591/IJEEI.V7I4.968","url":null,"abstract":"Deep learning approach has becoming a research interest in action recognition application due to its ability to surpass the performance of conventional machine learning approaches. Convolutional Neural Network (CNN) is among the widely used architecture in most action recognition works. There are various models exist in CNN but no research has been done to analyse which model has the best performance in recognizing actions for badminton sport. Hence, in this paper we are comparing the performance of four different pre-trained models of deep CNN in classifying the badminton match images to recognize the different actions done by the athlete. Four models used for comparison are AlexNet, GoogleNet, VggNet-16 and VggNet-19. The images used in this experimental work are categorized into two classes: hit and non-hit action. Firstly, each image frame was extracted from Yonex All England Man Single Match 2017 broadcast video. Then, the image frames were fed as the input to each classifier model for classification. Finally, the performance of each classifier model was evaluated by plotting its performance accuracy in form of confusion matrix. The result shows that the GoogleNet model has the highest classification accuracy which is 87.5% compared to other models. In a conclusion, the pre-trained GoogleNet model is capable to be used in recognizing actions in badminton match which might be useful in badminton sport performance technology.","PeriodicalId":13516,"journal":{"name":"Indonesian Journal of Electrical Engineering and Informatics (IJEEI)","volume":"27 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-11-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75328743","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Resource Efficient Single Precision Floating Point Multiplier Using Karatsuba Algorithm 使用Karatsuba算法的资源高效单精度浮点乘法器
Pub Date : 2018-09-01 DOI: 10.11591/IJEEI.V6I3.532
Gowreesrinivas V K, Samundiswary P
In floating point arithmetic operations, multiplication is the most required operation for many signal processing and scientific applications. 24-bit length mantissa multiplication is involved to obtain the floating point multiplication final result for two given single precision floating point numbers. This mantissa multiplication plays the major role in the performance evaluation in respect of occupied area and propagation delay. This paper presents the design and analysis of single precision floating point multiplication using karatsuba algorithm with vedic multiplier with the considering of modified 2x1 multiplexers and modified 4:2 compressors in order to overcome the drawbacks in the existing techniques . Further , the performance analysis of single precision floating point multiplier is analyzed in terms of area and delay using Karatsuba Algorithm with different existing techniques such as 4x1 multiplexers and 3:2 compressors and modified techniques such as 2x1 multiplexers, 4:2 compressors. From the simulation results, it is observed that single precision floating point multiplication with karatsuba algorithm using modified 4:2 compressor with XOR-MUX logic provides better performance with efficient usage of resources such as area and delay than that of existing techniques. All the blocks involved for floating point multiplication are coded with Verilog and synthesized using Xilinx ISE Simulator.
在浮点算术运算中,乘法运算是许多信号处理和科学应用中最需要的运算。对给定的两个单精度浮点数进行24位长度的尾数乘法,得到浮点乘法的最终结果。这种尾数乘法在占用面积和传播延迟方面的性能评价中起主要作用。为了克服现有技术的缺陷,本文在考虑改进的2x1多路复用器和改进的4:2压缩器的情况下,设计并分析了基于vedic乘法器的karatsuba算法的单精度浮点乘法。在此基础上,利用Karatsuba算法对现有的4x1多路复用器和3:2压缩器以及改进后的2x1多路复用器和4:2压缩器进行了单精度浮点乘法器的面积和时延性能分析。仿真结果表明,采用改进的4:2压缩器和XOR-MUX逻辑的单精度浮点乘法与karatsuba算法相比,在有效利用面积和延迟等资源方面具有更好的性能。所有涉及浮点乘法的块都是用Verilog编码的,并使用Xilinx ISE模拟器进行合成。
{"title":"Resource Efficient Single Precision Floating Point Multiplier Using Karatsuba Algorithm","authors":"Gowreesrinivas V K, Samundiswary P","doi":"10.11591/IJEEI.V6I3.532","DOIUrl":"https://doi.org/10.11591/IJEEI.V6I3.532","url":null,"abstract":"In floating point arithmetic operations, multiplication is the most required operation for many signal processing and scientific applications. 24-bit length mantissa multiplication is involved to obtain the floating point multiplication final result for two given single precision floating point numbers. This mantissa multiplication plays the major role in the performance evaluation in respect of occupied area and propagation delay. This paper presents the design and analysis of single precision floating point multiplication using karatsuba algorithm with vedic multiplier with the considering of modified 2x1 multiplexers and modified 4:2 compressors in order to overcome the drawbacks in the existing techniques . Further , the performance analysis of single precision floating point multiplier is analyzed in terms of area and delay using Karatsuba Algorithm with different existing techniques such as 4x1 multiplexers and 3:2 compressors and modified techniques such as 2x1 multiplexers, 4:2 compressors. From the simulation results, it is observed that single precision floating point multiplication with karatsuba algorithm using modified 4:2 compressor with XOR-MUX logic provides better performance with efficient usage of resources such as area and delay than that of existing techniques. All the blocks involved for floating point multiplication are coded with Verilog and synthesized using Xilinx ISE Simulator.","PeriodicalId":13516,"journal":{"name":"Indonesian Journal of Electrical Engineering and Informatics (IJEEI)","volume":"175 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76614217","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
Indonesian Journal of Electrical Engineering and Informatics (IJEEI)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1