首页 > 最新文献

2022 IEEE International Conference on Industry 4.0, Artificial Intelligence, and Communications Technology (IAICT)最新文献

英文 中文
Design of Home Security System Using Face Recognition with Convolutional Neural Network Method 基于卷积神经网络的人脸识别家庭安防系统设计
Lidya Nabila, W. Priharti, Istiqomah
Home security system with good accuracy and efficiency in controlling access to the door system is needed in order to identify people who enter the house accurately. Home security conventionally uses a key to open the door, making security low due to several factors. Various face recognition methods has been studied to determine the most accurate method in identifying people who has access to the house. In this study, Haar Cascade and CNN (Convolutional Neural Network) method were applied to face detection and classify 5 class of family member that can access the house. Based on the results of the analysis, the CNN model in this study uses an 64x64 sizes of input, 0.001 learning rate value, 3x3 filter size, 10 number of epochs, 1200 training data with 240 data for each class, and 150 testing data with 30 data for each class. The classification process yields the accuracy of 99% in identifying the family member of the house, hence giving access to open the door.
家庭安防系统需要具有良好的准确性和效率来控制门禁系统的进出,以便准确地识别进入家中的人。家庭安全通常使用钥匙开门,由于几个因素,使安全性低。人们研究了各种人脸识别方法,以确定最准确的方法来识别谁可以进入房子。本研究采用Haar Cascade和CNN(卷积神经网络)方法进行人脸检测,并对5类可以进入房屋的家庭成员进行分类。根据分析结果,本研究的CNN模型使用了64x64的输入大小,0.001的学习率值,3x3的滤波器大小,10个epoch, 1200个训练数据,每类240个数据,150个测试数据,每类30个数据。分类过程在识别房屋家庭成员方面的准确率达到99%,因此可以打开门。
{"title":"Design of Home Security System Using Face Recognition with Convolutional Neural Network Method","authors":"Lidya Nabila, W. Priharti, Istiqomah","doi":"10.1109/IAICT55358.2022.9887404","DOIUrl":"https://doi.org/10.1109/IAICT55358.2022.9887404","url":null,"abstract":"Home security system with good accuracy and efficiency in controlling access to the door system is needed in order to identify people who enter the house accurately. Home security conventionally uses a key to open the door, making security low due to several factors. Various face recognition methods has been studied to determine the most accurate method in identifying people who has access to the house. In this study, Haar Cascade and CNN (Convolutional Neural Network) method were applied to face detection and classify 5 class of family member that can access the house. Based on the results of the analysis, the CNN model in this study uses an 64x64 sizes of input, 0.001 learning rate value, 3x3 filter size, 10 number of epochs, 1200 training data with 240 data for each class, and 150 testing data with 30 data for each class. The classification process yields the accuracy of 99% in identifying the family member of the house, hence giving access to open the door.","PeriodicalId":154027,"journal":{"name":"2022 IEEE International Conference on Industry 4.0, Artificial Intelligence, and Communications Technology (IAICT)","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126029900","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Method for Designing an Embedded Human Activity Recognition System for a Kitchen Use Case Based on Machine Learning 基于机器学习的嵌入式厨房用例人体活动识别系统设计方法
Marc Schroth, Andreas Ilg, L. Kohout, Wilhelm Stork
Human activity recognition enables technical systems to analyse human behaviour in various settings. For example, it can be directly used to support the user in elder care, healthcare or training environments. Nevertheless, human activities are often times highly variable and therefore pose a challenge for any technical system to correctly classify and, even more importantly, generate a feedback that is valuable to the user. In this paper the process for designing a system that uses machine learning on the sensor node itself is presented in order to improve human activity recognition within a sensor network. Each sensor node of the network consists of a Bluetooth capable system on module and an accelerometer. The acceleration data is used to distinguish between several slicing techniques of different vegetables with the aim to help the network to distinguish the different dishes cooked with those vegetables. Various steps were taken to find the best possible machine learning model and sensor configuration to infer the cut vegetable on the sensor hardware, which is based on a standard microcontroller and therefore poses a challenge with its limited memory. Overall, the system is able to correctly infer the correct class most of the times while enabling a sufficient battery run time. Within this paper these steps and tests for the design and implementation of the embedded machine learning algorithm is described and its capability for activity recognition evaluated
人类活动识别使技术系统能够分析各种环境下的人类行为。例如,它可以直接用于支持老年人护理、医疗保健或培训环境中的用户。然而,人类活动往往是高度可变的,因此对任何技术系统正确分类构成挑战,更重要的是,产生对用户有价值的反馈。本文介绍了在传感器节点本身上使用机器学习的系统设计过程,以提高传感器网络中人类活动的识别能力。网络的每个传感器节点由一个具有蓝牙功能的系统模块和一个加速度计组成。加速度数据用于区分不同蔬菜的几种切片技术,目的是帮助网络区分用这些蔬菜烹制的不同菜肴。为了找到最好的机器学习模型和传感器配置,我们采取了各种措施来推断传感器硬件上的切菜,这是基于标准微控制器的,因此对其有限的内存提出了挑战。总体而言,该系统能够在大多数情况下正确推断正确的类别,同时保证足够的电池运行时间。本文描述了嵌入式机器学习算法设计和实现的步骤和测试,并对其活动识别能力进行了评估
{"title":"A Method for Designing an Embedded Human Activity Recognition System for a Kitchen Use Case Based on Machine Learning","authors":"Marc Schroth, Andreas Ilg, L. Kohout, Wilhelm Stork","doi":"10.1109/IAICT55358.2022.9887452","DOIUrl":"https://doi.org/10.1109/IAICT55358.2022.9887452","url":null,"abstract":"Human activity recognition enables technical systems to analyse human behaviour in various settings. For example, it can be directly used to support the user in elder care, healthcare or training environments. Nevertheless, human activities are often times highly variable and therefore pose a challenge for any technical system to correctly classify and, even more importantly, generate a feedback that is valuable to the user. In this paper the process for designing a system that uses machine learning on the sensor node itself is presented in order to improve human activity recognition within a sensor network. Each sensor node of the network consists of a Bluetooth capable system on module and an accelerometer. The acceleration data is used to distinguish between several slicing techniques of different vegetables with the aim to help the network to distinguish the different dishes cooked with those vegetables. Various steps were taken to find the best possible machine learning model and sensor configuration to infer the cut vegetable on the sensor hardware, which is based on a standard microcontroller and therefore poses a challenge with its limited memory. Overall, the system is able to correctly infer the correct class most of the times while enabling a sufficient battery run time. Within this paper these steps and tests for the design and implementation of the embedded machine learning algorithm is described and its capability for activity recognition evaluated","PeriodicalId":154027,"journal":{"name":"2022 IEEE International Conference on Industry 4.0, Artificial Intelligence, and Communications Technology (IAICT)","volume":"397 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124192801","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Hardware Realization of Sigmoid and Hyperbolic Tangent Activation Functions s型和双曲正切激活函数的硬件实现
Subhanjan Konwer, Maria Sojan, P. Adeeb Kenz, Sooraj K Santhosh, Tresa Joseph, T. Bindiya
Artificial neural networks have gradually become omnipresent to the extent that they are recognised as the explicit solution to innumerable practical applications across various domains. This work aims to propose a novel hardware architecture for implementing the activation functions recurrently employed in artificial neural networks. The approach involves the development of a new hardware for the sigmoid and hyperbolic tangent activation functions based on the optimised polynomial approximations, which comprises of the critical half of realising neural Networks in general and recurrent neural networks in particular.
人工神经网络已经逐渐变得无所不在,以至于它们被认为是跨各个领域无数实际应用的显式解决方案。本工作旨在提出一种新的硬件架构来实现人工神经网络中经常使用的激活函数。该方法涉及基于优化多项式近似的s型和双曲正切激活函数的新硬件开发,其中包括实现一般神经网络和循环神经网络的关键一半。
{"title":"Hardware Realization of Sigmoid and Hyperbolic Tangent Activation Functions","authors":"Subhanjan Konwer, Maria Sojan, P. Adeeb Kenz, Sooraj K Santhosh, Tresa Joseph, T. Bindiya","doi":"10.1109/IAICT55358.2022.9887382","DOIUrl":"https://doi.org/10.1109/IAICT55358.2022.9887382","url":null,"abstract":"Artificial neural networks have gradually become omnipresent to the extent that they are recognised as the explicit solution to innumerable practical applications across various domains. This work aims to propose a novel hardware architecture for implementing the activation functions recurrently employed in artificial neural networks. The approach involves the development of a new hardware for the sigmoid and hyperbolic tangent activation functions based on the optimised polynomial approximations, which comprises of the critical half of realising neural Networks in general and recurrent neural networks in particular.","PeriodicalId":154027,"journal":{"name":"2022 IEEE International Conference on Industry 4.0, Artificial Intelligence, and Communications Technology (IAICT)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114875867","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
ECG Biometric using Statistical Feature of EEMD and VMD 基于EEMD和VMD统计特征的心电生物识别
M. Fauzan, Achmad Rizal, S. Hadiyoso
Electrocardiogram (ECG), as a biometric that has been widely studied, has advantages that are difficult to fake compared to biometrics using physical characteristics. This study simulated an ECG based biometric system with 15 subjects. It used the Butterworth low pass filter (LPF), ensemble empirical mode decomposition (EEMD) or variational mode decomposition (VMD), and statistical features as feature extraction method. The filtered signal will be segmented, and the subsequent five level decomposition using EEMD and VMD. Then, the signal analysis used the statistical feature approach for each intrinsic mode function (IMF) as result of decomposition process. These values become a feature set entered of K-Nearest Neighbor (KNN) as classifier; the highest result of 93% was achieved using VMD and KNN with Manhattan distance.
心电图作为一种被广泛研究的生物识别技术,与利用身体特征进行生物识别相比,具有难以伪造的优点。本研究模拟了15名受试者的基于ECG的生物识别系统。采用Butterworth低通滤波器(LPF)、综经验模态分解(EEMD)或变分模态分解(VMD)和统计特征作为特征提取方法。将滤波后的信号进行分割,随后使用EEMD和VMD进行五电平分解。然后,对分解后的各本征模态函数(IMF)进行统计特征分析。这些值成为k近邻(KNN)作为分类器输入的特征集;在曼哈顿距离下,VMD和KNN的准确率最高,达到93%。
{"title":"ECG Biometric using Statistical Feature of EEMD and VMD","authors":"M. Fauzan, Achmad Rizal, S. Hadiyoso","doi":"10.1109/IAICT55358.2022.9887431","DOIUrl":"https://doi.org/10.1109/IAICT55358.2022.9887431","url":null,"abstract":"Electrocardiogram (ECG), as a biometric that has been widely studied, has advantages that are difficult to fake compared to biometrics using physical characteristics. This study simulated an ECG based biometric system with 15 subjects. It used the Butterworth low pass filter (LPF), ensemble empirical mode decomposition (EEMD) or variational mode decomposition (VMD), and statistical features as feature extraction method. The filtered signal will be segmented, and the subsequent five level decomposition using EEMD and VMD. Then, the signal analysis used the statistical feature approach for each intrinsic mode function (IMF) as result of decomposition process. These values become a feature set entered of K-Nearest Neighbor (KNN) as classifier; the highest result of 93% was achieved using VMD and KNN with Manhattan distance.","PeriodicalId":154027,"journal":{"name":"2022 IEEE International Conference on Industry 4.0, Artificial Intelligence, and Communications Technology (IAICT)","volume":"119 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132202410","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Exploring Bayesian Uncertainty Modeling for Book Genre Classification 探索贝叶斯不确定性模型在图书类型分类中的应用
Srinath Srinivasan, S. G. Shivanirudh, Sujay Sathya, T. T. Mirnalinee
In this paper, we aim to model the Bayesian uncertainty of a model designed to solve the task of book genre classification. Model prediction confidence can judge the predictive quality and usability of predictions made from a machine learning model. This work explores two methods to ascertain model uncertainty using Monte Carlo dropouts and deep ensembling. We apply uncertainty modeling to a bidirectional LSTM model trained on the CMU book summary dataset to perform book genre classification from book summaries. We show how these techniques improve results by 14% from the best baseline model and discuss their feasibility in real-world scenarios.
在本文中,我们的目的是建立贝叶斯不确定性模型来解决图书类型分类的任务。模型预测置信度可以判断机器学习模型预测的预测质量和可用性。这项工作探讨了两种方法来确定模型的不确定性使用蒙特卡罗dropouts和深度集成。我们将不确定性建模应用于在CMU图书摘要数据集上训练的双向LSTM模型,从图书摘要中进行图书类型分类。我们展示了这些技术如何将最佳基线模型的结果提高14%,并讨论了它们在现实场景中的可行性。
{"title":"Exploring Bayesian Uncertainty Modeling for Book Genre Classification","authors":"Srinath Srinivasan, S. G. Shivanirudh, Sujay Sathya, T. T. Mirnalinee","doi":"10.1109/IAICT55358.2022.9887417","DOIUrl":"https://doi.org/10.1109/IAICT55358.2022.9887417","url":null,"abstract":"In this paper, we aim to model the Bayesian uncertainty of a model designed to solve the task of book genre classification. Model prediction confidence can judge the predictive quality and usability of predictions made from a machine learning model. This work explores two methods to ascertain model uncertainty using Monte Carlo dropouts and deep ensembling. We apply uncertainty modeling to a bidirectional LSTM model trained on the CMU book summary dataset to perform book genre classification from book summaries. We show how these techniques improve results by 14% from the best baseline model and discuss their feasibility in real-world scenarios.","PeriodicalId":154027,"journal":{"name":"2022 IEEE International Conference on Industry 4.0, Artificial Intelligence, and Communications Technology (IAICT)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132301669","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Outage Statistics of Hybrid Double-RIS System Assisted by Aerial AF-Relay for Multi-hop Communications 空中af中继辅助下多跳通信混合双ris系统的中断统计
C. Stefanovic, Mohammad Alibakhshikenari, D. Stefanovic, F. Arpanaei, Stefan R. Panic
This paper considers single-input single-output (SISO) multi-hop wireless communication system (M-WCS) that consists of two dual-hop re-configurable intelligent surface (RIS)-enabled links that are connected by a unmanned aerial vehicle (UAV)-amplify-and-forward relay (AFR) in order to extend coverage. In particular, probability density function (PDF) $p_{R_{2}^{2}}(gamma_{tr,2})$ and cumulative distribution function (CDF) $F_{R_{2}^{2}}(gamma_{tr,2})$ of end-to-end SNR for the hybrid double RIS-enabled communications (RIS-ECs) with a UAV-AFR over dissimilar Rayleigh-Nakagami-m fading channels are derived. Capitalizing on the obtained mathematical expressions the system performance analysis in terms of outage probability (OP) $P_{R_{2}^{2}}(gamma_{tr,2})$ is further performed, graphically presented and analysed for different number of RIS modules and under various severity conditions. Moreover, we provide comparison between double RIS-ECs link with UAV-AFR and RIS-ECs link without UAVAFR in terms of outage statistics. It is further analysed that the RIS-ECs with UAV-AFR can not only extend the coverage but also can be deployed with sufficiently large number of RIS elements to improve the system performances.
本文考虑单输入单输出(SISO)多跳无线通信系统(M-WCS),该系统由两个双跳可重构智能表面(RIS)链路组成,由无人机(UAV)放大转发中继(AFR)连接,以扩大覆盖范围。特别推导了不同rayley - nakagami -m衰落信道下无人机- afr混合双ris通信(RIS-ECs)端到端信噪比的概率密度函数(PDF) $p_{R_{2}^{2}}(gamma_{tr,2})$和累积分布函数(CDF) $F_{R_{2}^{2}}(gamma_{tr,2})$。利用得到的数学表达式,进一步进行了基于中断概率(OP) $P_{R_{2}^{2}}(gamma_{tr,2})$的系统性能分析,并对不同数量的RIS模块和不同严重条件下的系统性能进行了图形化展示和分析。此外,我们在中断统计方面比较了带有UAV-AFR的双RIS-ECs链路和没有UAV-AFR的RIS-ECs链路。进一步分析了具有UAV-AFR的RIS- ec不仅可以扩大覆盖范围,而且可以部署足够数量的RIS元件以提高系统性能。
{"title":"Outage Statistics of Hybrid Double-RIS System Assisted by Aerial AF-Relay for Multi-hop Communications","authors":"C. Stefanovic, Mohammad Alibakhshikenari, D. Stefanovic, F. Arpanaei, Stefan R. Panic","doi":"10.1109/IAICT55358.2022.9887522","DOIUrl":"https://doi.org/10.1109/IAICT55358.2022.9887522","url":null,"abstract":"This paper considers single-input single-output (SISO) multi-hop wireless communication system (M-WCS) that consists of two dual-hop re-configurable intelligent surface (RIS)-enabled links that are connected by a unmanned aerial vehicle (UAV)-amplify-and-forward relay (AFR) in order to extend coverage. In particular, probability density function (PDF) $p_{R_{2}^{2}}(gamma_{tr,2})$ and cumulative distribution function (CDF) $F_{R_{2}^{2}}(gamma_{tr,2})$ of end-to-end SNR for the hybrid double RIS-enabled communications (RIS-ECs) with a UAV-AFR over dissimilar Rayleigh-Nakagami-m fading channels are derived. Capitalizing on the obtained mathematical expressions the system performance analysis in terms of outage probability (OP) $P_{R_{2}^{2}}(gamma_{tr,2})$ is further performed, graphically presented and analysed for different number of RIS modules and under various severity conditions. Moreover, we provide comparison between double RIS-ECs link with UAV-AFR and RIS-ECs link without UAVAFR in terms of outage statistics. It is further analysed that the RIS-ECs with UAV-AFR can not only extend the coverage but also can be deployed with sufficiently large number of RIS elements to improve the system performances.","PeriodicalId":154027,"journal":{"name":"2022 IEEE International Conference on Industry 4.0, Artificial Intelligence, and Communications Technology (IAICT)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126525168","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Sensor data modeling with Bayesian networks 基于贝叶斯网络的传感器数据建模
Carla Silva, A. Rodrigues, A. Jorge, I. Dutra
This research aims to extract knowledge of sensors behavior resorting to Bayesian networks (BNs) and dynamic Bayesian networks (DBNs), a time-based BN version. These two types of models belong to the group of probabilistic graphical models (PGMs). These graphical models can be very useful to get insights from data in order to improve sensor capabilities in the industry of fire detection systems, since it can provide the conditional dependence structure among various sensor variables. Relevant sensors with fire alerts were selected and studied at device level. We conduct a data fusion analysis since we deal with heterogeneous data sources, Remote Alert (RA) with sensor states and Condition Monitoring (CM) with numerical data. To achieve an accurate fusion of the data, a pipeline was designed to align both sources of data in a regular time interval. Furthermore, a change point detection (CPD) method was used to discretize the numerical variables. In addition, one-hot encoding was used to create binarized datasets and combine all data (RA+CM). Our modeling helps understanding the dependencies among the sensor variables, highlighting that individual devices of the same type can have a very different probabilistic behavior along the time, probably due to be installed in distinct regions. Moreover, the models helped capturing strange probabilistic sensor behavior such as a low probability of a NORMAL state happening given that states FIRE, WARNING and TROUBLE did not happen.
本研究旨在通过贝叶斯网络(BNs)和动态贝叶斯网络(DBNs)(一种基于时间的贝叶斯网络版本)提取传感器行为的知识。这两种类型的模型都属于概率图模型(PGMs)。这些图形模型可以非常有用地从数据中获得洞察力,以提高火灾探测系统行业中的传感器能力,因为它可以提供各种传感器变量之间的条件依赖结构。选取具有火灾报警功能的相关传感器,在设备层面进行研究。我们进行了数据融合分析,因为我们处理异构数据源,远程警报(RA)与传感器状态和状态监测(CM)与数值数据。为了实现数据的精确融合,设计了一个管道,以固定的时间间隔对齐两个数据源。采用变化点检测(CPD)方法对数值变量进行离散化处理。此外,采用一热编码创建二值化的数据集并合并所有数据(RA+CM)。我们的建模有助于理解传感器变量之间的依赖关系,强调同一类型的单个设备随着时间的推移可能具有非常不同的概率行为,这可能是由于安装在不同的区域。此外,这些模型还有助于捕捉奇怪的概率传感器行为,比如在FIRE、WARNING和TROUBLE状态没有发生的情况下,正常状态发生的概率很低。
{"title":"Sensor data modeling with Bayesian networks","authors":"Carla Silva, A. Rodrigues, A. Jorge, I. Dutra","doi":"10.1109/IAICT55358.2022.9887461","DOIUrl":"https://doi.org/10.1109/IAICT55358.2022.9887461","url":null,"abstract":"This research aims to extract knowledge of sensors behavior resorting to Bayesian networks (BNs) and dynamic Bayesian networks (DBNs), a time-based BN version. These two types of models belong to the group of probabilistic graphical models (PGMs). These graphical models can be very useful to get insights from data in order to improve sensor capabilities in the industry of fire detection systems, since it can provide the conditional dependence structure among various sensor variables. Relevant sensors with fire alerts were selected and studied at device level. We conduct a data fusion analysis since we deal with heterogeneous data sources, Remote Alert (RA) with sensor states and Condition Monitoring (CM) with numerical data. To achieve an accurate fusion of the data, a pipeline was designed to align both sources of data in a regular time interval. Furthermore, a change point detection (CPD) method was used to discretize the numerical variables. In addition, one-hot encoding was used to create binarized datasets and combine all data (RA+CM). Our modeling helps understanding the dependencies among the sensor variables, highlighting that individual devices of the same type can have a very different probabilistic behavior along the time, probably due to be installed in distinct regions. Moreover, the models helped capturing strange probabilistic sensor behavior such as a low probability of a NORMAL state happening given that states FIRE, WARNING and TROUBLE did not happen.","PeriodicalId":154027,"journal":{"name":"2022 IEEE International Conference on Industry 4.0, Artificial Intelligence, and Communications Technology (IAICT)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127700402","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design of a Personal Digital Assistant for the Visually Challenged 为视觉障碍人士设计的个人数字助理
Lyla B. Das, E. P. Jayakumar, G. Jagadanand, O. Meghana, P. Satheesh, R. Sriharsha, V. L. Prasanna, Vundavalli Aswini
This paper intends to address the problems of people who are visually challenged. One of the most vital parts of the human body is the eyes, unarguably. A visually challenged person is unable to appreciate many good things in life and has to spend his entire lifetime in darkness whereas a person without hands or legs can still do his daily chores on his own. Also, in the knowledge driven world, quality education is an absolute necessity in order to succeed and advance. All the available books and documents are not in the digital format. For a visually challenged person, to access these, a portable text reader is required. People with impaired vision face difficulty in their locomotion. They need to remember all the objects around when they are moving around in familiar places (home environment). This work proposes a hand-held device for visually handicapped people that integrates a Text Read-out system and a navigation assistant, which will help them to handle such challenging situations. This paper describes the implementation of a system that acts as a personal device for people with vision impairment. The implementation is done using ‘off the shelf hardware and software’ components.
这篇论文的目的是解决视觉障碍人士的问题。毫无疑问,眼睛是人体最重要的部分之一。一个有视觉障碍的人无法欣赏生活中的许多美好事物,不得不在黑暗中度过一生,而一个没有手或腿的人仍然可以自己做日常琐事。此外,在知识驱动的世界里,为了成功和进步,素质教育是绝对必要的。并非所有可用的书籍和文件都是数字格式的。对于视力障碍的人来说,要访问这些内容,需要便携式文本阅读器。视力受损的人在行动上有困难。当他们在熟悉的地方(家庭环境)活动时,他们需要记住周围所有的物体。本研究提出一种为视障人士设计的手持式装置,该装置集文字读出系统和导航辅助功能于一体,可以帮助视障人士处理这些具有挑战性的情况。本文描述了一个系统的实现,作为一个个人设备,为视力受损的人。实现是使用“现成的硬件和软件”组件完成的。
{"title":"Design of a Personal Digital Assistant for the Visually Challenged","authors":"Lyla B. Das, E. P. Jayakumar, G. Jagadanand, O. Meghana, P. Satheesh, R. Sriharsha, V. L. Prasanna, Vundavalli Aswini","doi":"10.1109/IAICT55358.2022.9887423","DOIUrl":"https://doi.org/10.1109/IAICT55358.2022.9887423","url":null,"abstract":"This paper intends to address the problems of people who are visually challenged. One of the most vital parts of the human body is the eyes, unarguably. A visually challenged person is unable to appreciate many good things in life and has to spend his entire lifetime in darkness whereas a person without hands or legs can still do his daily chores on his own. Also, in the knowledge driven world, quality education is an absolute necessity in order to succeed and advance. All the available books and documents are not in the digital format. For a visually challenged person, to access these, a portable text reader is required. People with impaired vision face difficulty in their locomotion. They need to remember all the objects around when they are moving around in familiar places (home environment). This work proposes a hand-held device for visually handicapped people that integrates a Text Read-out system and a navigation assistant, which will help them to handle such challenging situations. This paper describes the implementation of a system that acts as a personal device for people with vision impairment. The implementation is done using ‘off the shelf hardware and software’ components.","PeriodicalId":154027,"journal":{"name":"2022 IEEE International Conference on Industry 4.0, Artificial Intelligence, and Communications Technology (IAICT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114424928","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design of Radio over Fiber System with 16-QAM Modulation for 5G Fronthaul Network Implementation in Indonesia 印尼实现5G前传网络的16-QAM调制光纤无线电系统设计
Nabila Syadzwina Effendi, Y. Natali, C. Apriono
In 5G Network, Cloud Radio Access Network (C-RAN) plays a substantial role in escalating network performance efficiency. Nevertheless, this C-RAN concept’s main challenge lies in the need for a fronthaul network to handle high capacity and low delay. The Radio over Fiber (RoF) has been a solution to satisfy the high capacity and high-speed transmission required by the 5G fronthaul network. Keeping the attenuation effect low to achieve the minimum BER by using the optical amplifier is necessary. This paper investigates RoF by considering amplifier placement and different bitrate with 16-QAM modulation for Indonesia’s 5G Fronthaul Network Implementation. Optical amplifier placement scenarios are pre-amplifier and booster amplifier. The results show that the booster amplifier scheme can cover a maximum fronthaul transmission distance of 20 km. As a comparison, the pre-amplifier scheme can reach a transmission distance of up to 15 km. Moreover, increasing the bitrate from 1 Gbps to 2.5 Gbps causes the BER value to increase. This result shows that different optical amplifiers and the increase in bit rate will affect the obtained BER values and limit the transmission distance that the fronthaul network can achieve.
在5G网络中,云无线接入网(C-RAN)在提升网络性能效率方面发挥着重要作用。然而,这种C-RAN概念的主要挑战在于需要一个前传网络来处理高容量和低延迟。光纤无线电(RoF)是满足5G前传网络要求的高容量和高速传输的解决方案。通过使用光放大器,保持低衰减效果以达到最小误码率是必要的。本文通过考虑放大器放置和16-QAM调制的不同比特率来研究印度尼西亚5G前传网络实现的RoF。光放大器的放置方案有前置放大器和升压放大器。结果表明,升压放大方案可以覆盖最大20 km的前传传输距离。作为比较,前置放大器方案可以达到15公里的传输距离。此外,将比特率从1gbps增加到2.5 Gbps会导致BER值增加。结果表明,不同的光放大器和比特率的增加会影响得到的误码率值,并限制前传网络所能达到的传输距离。
{"title":"Design of Radio over Fiber System with 16-QAM Modulation for 5G Fronthaul Network Implementation in Indonesia","authors":"Nabila Syadzwina Effendi, Y. Natali, C. Apriono","doi":"10.1109/IAICT55358.2022.9887482","DOIUrl":"https://doi.org/10.1109/IAICT55358.2022.9887482","url":null,"abstract":"In 5G Network, Cloud Radio Access Network (C-RAN) plays a substantial role in escalating network performance efficiency. Nevertheless, this C-RAN concept’s main challenge lies in the need for a fronthaul network to handle high capacity and low delay. The Radio over Fiber (RoF) has been a solution to satisfy the high capacity and high-speed transmission required by the 5G fronthaul network. Keeping the attenuation effect low to achieve the minimum BER by using the optical amplifier is necessary. This paper investigates RoF by considering amplifier placement and different bitrate with 16-QAM modulation for Indonesia’s 5G Fronthaul Network Implementation. Optical amplifier placement scenarios are pre-amplifier and booster amplifier. The results show that the booster amplifier scheme can cover a maximum fronthaul transmission distance of 20 km. As a comparison, the pre-amplifier scheme can reach a transmission distance of up to 15 km. Moreover, increasing the bitrate from 1 Gbps to 2.5 Gbps causes the BER value to increase. This result shows that different optical amplifiers and the increase in bit rate will affect the obtained BER values and limit the transmission distance that the fronthaul network can achieve.","PeriodicalId":154027,"journal":{"name":"2022 IEEE International Conference on Industry 4.0, Artificial Intelligence, and Communications Technology (IAICT)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131127172","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Identification of Extraversion and Neuroticism Personality Dimensions Using IndoBERT’s Deep Learning Model 利用IndoBERT深度学习模型识别外向性和神经质人格维度
N. Dudija, Lezia Natalia, A. Alamsyah, A. Romadhony
Human resources are essential for the business organization to adapt to change. Identifying the personality dimensions of new talent could help recruiters conduct the selection process of matching skilled talent to the organization’s needs. The objective of this study is to identify the personality dimensions corresponding to the job need, which correlates with extraversion and neuroticism. The legacy methodology to determine personality dimensions is through interviews or questionnaire surveys, but this process is costly and takes longer time to complete. This paper proposes a work on a person personality identification based on social media text as a complementary methodology. We utilize the textual data to support identifying new talent personality dimensions. In this study, we use IndoBERT model to capture person personality dimension based on their post on Twitter social media. As a result, our model achieves 96% accuracy in identifying extraversion and neuroticism personality dimensions. We also compare our result with the previous work based on the ontology model.
人力资源是企业组织适应变化的必要条件。确定新人才的个性维度可以帮助招聘人员进行匹配技能人才与组织需求的选择过程。本研究的目的是确定与工作需求相对应的人格维度,这些维度与外向性和神经质相关。确定人格维度的传统方法是通过访谈或问卷调查,但这个过程成本高,需要更长的时间来完成。本文提出了一项基于社交媒体文本作为补充方法论的人格识别工作。我们利用文本数据来支持识别新的人才人格维度。在这项研究中,我们使用IndoBERT模型来捕捉基于Twitter社交媒体上的人的个性维度。结果表明,该模型识别外向性和神经质人格维度的准确率达到96%。我们还将我们的结果与先前基于本体模型的工作进行了比较。
{"title":"Identification of Extraversion and Neuroticism Personality Dimensions Using IndoBERT’s Deep Learning Model","authors":"N. Dudija, Lezia Natalia, A. Alamsyah, A. Romadhony","doi":"10.1109/IAICT55358.2022.9887476","DOIUrl":"https://doi.org/10.1109/IAICT55358.2022.9887476","url":null,"abstract":"Human resources are essential for the business organization to adapt to change. Identifying the personality dimensions of new talent could help recruiters conduct the selection process of matching skilled talent to the organization’s needs. The objective of this study is to identify the personality dimensions corresponding to the job need, which correlates with extraversion and neuroticism. The legacy methodology to determine personality dimensions is through interviews or questionnaire surveys, but this process is costly and takes longer time to complete. This paper proposes a work on a person personality identification based on social media text as a complementary methodology. We utilize the textual data to support identifying new talent personality dimensions. In this study, we use IndoBERT model to capture person personality dimension based on their post on Twitter social media. As a result, our model achieves 96% accuracy in identifying extraversion and neuroticism personality dimensions. We also compare our result with the previous work based on the ontology model.","PeriodicalId":154027,"journal":{"name":"2022 IEEE International Conference on Industry 4.0, Artificial Intelligence, and Communications Technology (IAICT)","volume":"228 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115947639","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
2022 IEEE International Conference on Industry 4.0, Artificial Intelligence, and Communications Technology (IAICT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1