首页 > 最新文献

2023 12th Mediterranean Conference on Embedded Computing (MECO)最新文献

英文 中文
A Multicore Implementation of an AUTOSAR-based XCP Module 基于autosar的XCP模块的多核实现
Pub Date : 2023-06-06 DOI: 10.1109/MECO58584.2023.10154903
Mahmoud Osama, S. Hammad, Nancy E. ElHady, M. El-Kharashi
The automotive industry depends on computers to control and monitor vehicles behaviour. The Universal Measurement and Calibration Protocol (XCP) connects calibration systems to electronic control units (ECUs). Nowadays, AUTOSAR-based XCP for single core ECUs is widely used in automotive industry. As the demand for computing power is rapidly increasing in the automotive domain, car manufacturers are gradually introducing multi-core ECUs in their electronic architectures. Multi-core ECUs provide high level of parallelism. This research work aims to deliver a multi-core implementation of an AUTOSAR-based XCP module, as it is important to have an efficient process of measurement and calibration on multi-core targets. The paper results are ensuring data consistency on the application level, avoiding race conditions between writer core and reader core which might result in processing rubbish data, and decreasing data dependency between cores.
汽车工业依靠计算机来控制和监控车辆的行为。通用测量和校准协议(XCP)将校准系统连接到电子控制单元(ecu)。目前,基于autosar的单核心ecu XCP已广泛应用于汽车行业。随着汽车领域对计算能力需求的快速增长,汽车制造商逐渐在其电子架构中引入多核ecu。多核ecu提供高水平的并行性。这项研究工作旨在提供基于autosar的XCP模块的多核实现,因为在多核目标上具有有效的测量和校准过程非常重要。本文的研究结果在保证应用层的数据一致性,避免写核和读核之间可能导致垃圾数据处理的竞争条件,减少核之间的数据依赖性等方面取得了显著的进展。
{"title":"A Multicore Implementation of an AUTOSAR-based XCP Module","authors":"Mahmoud Osama, S. Hammad, Nancy E. ElHady, M. El-Kharashi","doi":"10.1109/MECO58584.2023.10154903","DOIUrl":"https://doi.org/10.1109/MECO58584.2023.10154903","url":null,"abstract":"The automotive industry depends on computers to control and monitor vehicles behaviour. The Universal Measurement and Calibration Protocol (XCP) connects calibration systems to electronic control units (ECUs). Nowadays, AUTOSAR-based XCP for single core ECUs is widely used in automotive industry. As the demand for computing power is rapidly increasing in the automotive domain, car manufacturers are gradually introducing multi-core ECUs in their electronic architectures. Multi-core ECUs provide high level of parallelism. This research work aims to deliver a multi-core implementation of an AUTOSAR-based XCP module, as it is important to have an efficient process of measurement and calibration on multi-core targets. The paper results are ensuring data consistency on the application level, avoiding race conditions between writer core and reader core which might result in processing rubbish data, and decreasing data dependency between cores.","PeriodicalId":187825,"journal":{"name":"2023 12th Mediterranean Conference on Embedded Computing (MECO)","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123094715","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Parallelizing Non-Neural ML Algorithm for Edge-based Face Recognition on Parallel Ultra-Low Power (PULP) Cluster 基于并行超低功耗(PULP)聚类的边缘人脸识别并行非神经机器学习算法
Pub Date : 2023-06-06 DOI: 10.1109/MECO58584.2023.10154955
M. S. Nagar, Rahul Kumar, Pinalkumar Engineer
The multi-core parallel ultra-low power (PULP) cluster architecture allows the IoT edge node to shift toward near-sensor computing. In this paper, non-neural Eigenfaces-based face recognition (FR) is examined on an octa-core PULP cluster. It is possible to achieve high accuracy in the Eigenfaces-based algorithm without using a large data model. It is observed that the Eigenfaces-based face recognition algorithm achieved 93% accuracy on the PULP platform with a $4.55times$ lesser model size compared to the state-of-the-art SqueezeNet1.1-based FR algorithm on GAP8 platform. Parallelization of Eigenfaces-based face recognition is done to achieve maximum speed-up on multi-core, reducing recognition time. Furthermore, DMA-based communication between the fabric controller and multi-core cluster reduces the recognition time by $50times$ at the cost of a little degradation in speed-up on the multi-core. By adopting this technique, 165 faces per second are recognized with 93% accuracy on octa-core PULP cluster, which is $7.85times$ faster than a single core RISC-V with DMA. Compared to the ARM Cortex-M7 architecture, the multi-core PULP cluster reduces recognition time by 89.89%. These results make the multi-core PULP cluster an efficient choice for Eigenfaces-based face recognition on the edge.
多核并行超低功耗(PULP)集群架构允许物联网边缘节点向近传感器计算转变。本文在八核PULP聚类上研究了基于非神经特征脸的人脸识别。在不使用大数据模型的情况下,基于特征面的算法可以达到较高的精度。研究发现,与GAP8平台上基于squeezenet1.1的人脸识别算法相比,基于特征脸的人脸识别算法在PULP平台上实现了93%的准确率,模型尺寸减小了4.55倍。对基于特征脸的人脸识别进行并行化处理,在多核上实现最大的加速,减少识别时间。此外,基于dma的结构控制器和多核集群之间的通信将识别时间缩短了50倍,但代价是多核的加速速度略有下降。通过采用该技术,在八核PULP集群上每秒识别165张人脸,准确率为93%,比带有DMA的单核RISC-V快7.85倍。与ARM Cortex-M7架构相比,多核PULP集群的识别时间缩短了89.89%。这些结果使得多核PULP聚类成为基于特征脸的边缘人脸识别的有效选择。
{"title":"Parallelizing Non-Neural ML Algorithm for Edge-based Face Recognition on Parallel Ultra-Low Power (PULP) Cluster","authors":"M. S. Nagar, Rahul Kumar, Pinalkumar Engineer","doi":"10.1109/MECO58584.2023.10154955","DOIUrl":"https://doi.org/10.1109/MECO58584.2023.10154955","url":null,"abstract":"The multi-core parallel ultra-low power (PULP) cluster architecture allows the IoT edge node to shift toward near-sensor computing. In this paper, non-neural Eigenfaces-based face recognition (FR) is examined on an octa-core PULP cluster. It is possible to achieve high accuracy in the Eigenfaces-based algorithm without using a large data model. It is observed that the Eigenfaces-based face recognition algorithm achieved 93% accuracy on the PULP platform with a $4.55times$ lesser model size compared to the state-of-the-art SqueezeNet1.1-based FR algorithm on GAP8 platform. Parallelization of Eigenfaces-based face recognition is done to achieve maximum speed-up on multi-core, reducing recognition time. Furthermore, DMA-based communication between the fabric controller and multi-core cluster reduces the recognition time by $50times$ at the cost of a little degradation in speed-up on the multi-core. By adopting this technique, 165 faces per second are recognized with 93% accuracy on octa-core PULP cluster, which is $7.85times$ faster than a single core RISC-V with DMA. Compared to the ARM Cortex-M7 architecture, the multi-core PULP cluster reduces recognition time by 89.89%. These results make the multi-core PULP cluster an efficient choice for Eigenfaces-based face recognition on the edge.","PeriodicalId":187825,"journal":{"name":"2023 12th Mediterranean Conference on Embedded Computing (MECO)","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116646043","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhancing Cyber Security in Industrial Internet of Things Systems: An Experimental Assessment 加强工业物联网系统的网络安全:一项实验评估
Pub Date : 2023-06-06 DOI: 10.1109/MECO58584.2023.10155100
A. Buja, M. Apostolova, A. Luma
In the digital age, Industry Control Systems (ICS) and the Industrial Internet of Things (IIoT) are having an impact on the operations of industry sectors. Although, with the development of technology even cyber-attacks have advanced in methods and techniques. The systems, which manage and control critical infrastructures such as power plants, manufacturing facilities, and transportation networks, are exposed to cyber-attacks. Nevertheless, security breaches can come from various cyber-attacks that target industrial systems, and in some cases, an infected device can affect the entire infrastructure in more disastrous attacks. This article digs into the existing models of ICS where we compare in terms of cyber-attacks, timely response, and impact control in the system is presented. This investigative work helps identify differences and create a proactive approach to security response. Finally, we will make an experimental assessment of the impact of security on existing models, in terms of recommendations for the advancement of cyber security in ICS and IIoT systems. Furthermore, we will present the different approaches that are now used to protect ICS and IIoT systems from cyber-attacks. In conclusion, the test found that the IIoT sensor and system are vulnerable to attacks used against it but not from malicious code injection.
在数字时代,工业控制系统(ICS)和工业物联网(IIoT)正在对工业部门的运营产生影响。虽然,随着技术的发展,甚至网络攻击在方法和技术上也有了进步。这些管理和控制关键基础设施(如发电厂、制造设施和交通网络)的系统容易受到网络攻击。然而,安全漏洞可能来自针对工业系统的各种网络攻击,在某些情况下,受感染的设备可能会在更灾难性的攻击中影响整个基础设施。本文深入研究了现有的ICS模型,并在系统中的网络攻击、及时响应和影响控制方面进行了比较。这项调查工作有助于确定差异,并为安全反应制定积极主动的方法。最后,我们将对安全性对现有模型的影响进行实验评估,为ICS和IIoT系统的网络安全进步提供建议。此外,我们将介绍目前用于保护ICS和IIoT系统免受网络攻击的不同方法。总之,测试发现IIoT传感器和系统容易受到针对它的攻击,但不会受到恶意代码注入的攻击。
{"title":"Enhancing Cyber Security in Industrial Internet of Things Systems: An Experimental Assessment","authors":"A. Buja, M. Apostolova, A. Luma","doi":"10.1109/MECO58584.2023.10155100","DOIUrl":"https://doi.org/10.1109/MECO58584.2023.10155100","url":null,"abstract":"In the digital age, Industry Control Systems (ICS) and the Industrial Internet of Things (IIoT) are having an impact on the operations of industry sectors. Although, with the development of technology even cyber-attacks have advanced in methods and techniques. The systems, which manage and control critical infrastructures such as power plants, manufacturing facilities, and transportation networks, are exposed to cyber-attacks. Nevertheless, security breaches can come from various cyber-attacks that target industrial systems, and in some cases, an infected device can affect the entire infrastructure in more disastrous attacks. This article digs into the existing models of ICS where we compare in terms of cyber-attacks, timely response, and impact control in the system is presented. This investigative work helps identify differences and create a proactive approach to security response. Finally, we will make an experimental assessment of the impact of security on existing models, in terms of recommendations for the advancement of cyber security in ICS and IIoT systems. Furthermore, we will present the different approaches that are now used to protect ICS and IIoT systems from cyber-attacks. In conclusion, the test found that the IIoT sensor and system are vulnerable to attacks used against it but not from malicious code injection.","PeriodicalId":187825,"journal":{"name":"2023 12th Mediterranean Conference on Embedded Computing (MECO)","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124802124","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Comparative Study of Automated Asset Declaration Systems in Selected European Countries 欧洲部分国家自动资产申报制度的比较研究
Pub Date : 2023-06-06 DOI: 10.1109/MECO58584.2023.10155029
Besnik Dragusha, Azir Aliu, A. Luma, Kadri Sylejmani
Senior public officials are required to periodically declare their assets to the national anti-corruption agency that manages and verifies the assets. Each anti-corruption agency currently has its own asset declaration system to identify any unusual asset growth or unjustified enrichment. Although most of these systems have digitized their declaration and submission processes, the preliminary control and full verification still require manual intervention. Our study analyzes and compares asset declaration systems of nine European countries, including four from the Western Balkans and five from other regions. We present a comparative analysis of their asset declaration processes, key features of the declaration form for full verification of declared assets, and indicators for identifying suspicious senior public officials' declarations. The study aims to identify key processes of asset declaration systems that can be automated for more effective decision-making, resulting in a more transparent and accountable system for public officials' asset declaration and management.
高级公职人员必须定期向管理和核查资产的国家反腐败机构申报资产。目前,每个反腐败机构都有自己的资产申报制度,以识别任何异常的资产增长或不正当的致富。虽然这些系统中的大多数已将其申报和提交过程数字化,但初步控制和全面核查仍然需要人工干预。我们的研究分析和比较了9个欧洲国家的资产申报制度,其中4个来自西巴尔干,5个来自其他地区。我们对他们的资产申报流程、全面核查申报资产的申报表格的主要特征以及识别可疑高级公职人员申报的指标进行了比较分析。该研究旨在确定资产申报系统的关键流程,这些流程可以自动化,从而更有效地决策,从而为公职人员的资产申报和管理建立一个更加透明和负责任的系统。
{"title":"A Comparative Study of Automated Asset Declaration Systems in Selected European Countries","authors":"Besnik Dragusha, Azir Aliu, A. Luma, Kadri Sylejmani","doi":"10.1109/MECO58584.2023.10155029","DOIUrl":"https://doi.org/10.1109/MECO58584.2023.10155029","url":null,"abstract":"Senior public officials are required to periodically declare their assets to the national anti-corruption agency that manages and verifies the assets. Each anti-corruption agency currently has its own asset declaration system to identify any unusual asset growth or unjustified enrichment. Although most of these systems have digitized their declaration and submission processes, the preliminary control and full verification still require manual intervention. Our study analyzes and compares asset declaration systems of nine European countries, including four from the Western Balkans and five from other regions. We present a comparative analysis of their asset declaration processes, key features of the declaration form for full verification of declared assets, and indicators for identifying suspicious senior public officials' declarations. The study aims to identify key processes of asset declaration systems that can be automated for more effective decision-making, resulting in a more transparent and accountable system for public officials' asset declaration and management.","PeriodicalId":187825,"journal":{"name":"2023 12th Mediterranean Conference on Embedded Computing (MECO)","volume":"111 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124888336","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Role of SOC in Ensuring the Security of IoT Devices: A Review of Current Challenges and Future Directions SOC在确保物联网设备安全中的作用:当前挑战和未来方向的回顾
Pub Date : 2023-06-06 DOI: 10.1109/MECO58584.2023.10155021
Hajar Bennouri, A. Abdi, Iqbal Hossain, Alexandre Pujol
The growing popularity and deployment of Internet of Things (IoT) devices has led to serious security concerns. The integration of a security operations center (SOC) becomes increasingly important in this situation to ensure the security of IoT devices. In this article, we will present a summary of IoT device security issues, their vulnerabilities, a review of current challenges to keep these devices secure, and discuss the role that SOC can bring in protecting IoT devices while considering the challenges encountered and the directions to consider when implementing a reliable SOC for IoT monitoring.
物联网(IoT)设备的日益普及和部署引发了严重的安全问题。在这种情况下,为了保证物联网设备的安全,安全运营中心(SOC)的集成变得越来越重要。在本文中,我们将概述物联网设备安全问题及其漏洞,回顾当前保持这些设备安全的挑战,并讨论SOC在保护物联网设备方面的作用,同时考虑到遇到的挑战以及在实施可靠的SOC时要考虑的方向物联网监控。
{"title":"The Role of SOC in Ensuring the Security of IoT Devices: A Review of Current Challenges and Future Directions","authors":"Hajar Bennouri, A. Abdi, Iqbal Hossain, Alexandre Pujol","doi":"10.1109/MECO58584.2023.10155021","DOIUrl":"https://doi.org/10.1109/MECO58584.2023.10155021","url":null,"abstract":"The growing popularity and deployment of Internet of Things (IoT) devices has led to serious security concerns. The integration of a security operations center (SOC) becomes increasingly important in this situation to ensure the security of IoT devices. In this article, we will present a summary of IoT device security issues, their vulnerabilities, a review of current challenges to keep these devices secure, and discuss the role that SOC can bring in protecting IoT devices while considering the challenges encountered and the directions to consider when implementing a reliable SOC for IoT monitoring.","PeriodicalId":187825,"journal":{"name":"2023 12th Mediterranean Conference on Embedded Computing (MECO)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122708230","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Crop yield forecasting with climate data using PCA and Machine Learning 利用PCA和机器学习的气候数据预测作物产量
Pub Date : 2023-06-06 DOI: 10.1109/MECO58584.2023.10155083
E. Vasileska, V. Gečevska, O. Čukaliev
Accurately forecasting annual crop production is crucial for countries as it enables them to formulate import and export policies and estimate the economic benefits of their agricultural planning. The crop growth is significantly influenced by weather conditions throughout the year, and climate conditions during different stages of plant development can greatly affect crop yield. The availability of historical climate data has greatly benefited the agricultural sciences and food sector, particularly with the application of Artificial Intelligence methods in big data analysis, enabling the extraction of practical information and actions. The objective of this research is to develop a predictive Machine Learning (ML) model that utilizes climate data from a specific time frame to forecast the wheat yield in the Pelagonia valley, a crucial region for wheat cultivation in North Macedonia. Principal Component Analysis (PCA) was employed as a dimensionality-reduction method to reduce the input data set's dimensionality. A least-squares boosting regression model was implemented as the ML method to estimate wheat yield from climate data. The results indicate a high accuracy of wheat yield prediction, even with limited dataset, on both the training and testing datasets. The study demonstrates the feasibility of utilizing ML methods as complementary to existing models for accurate wheat yield forecasting, offering significant advantages due to the ease of calibrating the ML model parameters.
准确预测年度作物产量对各国至关重要,因为这使它们能够制定进出口政策并估计其农业规划的经济效益。作物生长受全年气候条件影响显著,植物发育不同阶段的气候条件对作物产量影响较大。历史气候数据的可用性极大地造福了农业科学和食品部门,特别是人工智能方法在大数据分析中的应用,使提取实际信息和行动成为可能。本研究的目的是开发一种预测机器学习(ML)模型,该模型利用特定时间框架的气候数据来预测北马其顿小麦种植的关键地区Pelagonia山谷的小麦产量。采用主成分分析(PCA)作为降维方法对输入数据集进行降维。采用最小二乘增强回归模型作为机器学习方法,从气候数据中估计小麦产量。结果表明,即使在有限的数据集上,在训练和测试数据集上,小麦产量预测都具有较高的准确性。该研究表明,利用机器学习方法作为现有模型的补充进行准确小麦产量预测的可行性,由于易于校准机器学习模型参数,因此具有显著的优势。
{"title":"Crop yield forecasting with climate data using PCA and Machine Learning","authors":"E. Vasileska, V. Gečevska, O. Čukaliev","doi":"10.1109/MECO58584.2023.10155083","DOIUrl":"https://doi.org/10.1109/MECO58584.2023.10155083","url":null,"abstract":"Accurately forecasting annual crop production is crucial for countries as it enables them to formulate import and export policies and estimate the economic benefits of their agricultural planning. The crop growth is significantly influenced by weather conditions throughout the year, and climate conditions during different stages of plant development can greatly affect crop yield. The availability of historical climate data has greatly benefited the agricultural sciences and food sector, particularly with the application of Artificial Intelligence methods in big data analysis, enabling the extraction of practical information and actions. The objective of this research is to develop a predictive Machine Learning (ML) model that utilizes climate data from a specific time frame to forecast the wheat yield in the Pelagonia valley, a crucial region for wheat cultivation in North Macedonia. Principal Component Analysis (PCA) was employed as a dimensionality-reduction method to reduce the input data set's dimensionality. A least-squares boosting regression model was implemented as the ML method to estimate wheat yield from climate data. The results indicate a high accuracy of wheat yield prediction, even with limited dataset, on both the training and testing datasets. The study demonstrates the feasibility of utilizing ML methods as complementary to existing models for accurate wheat yield forecasting, offering significant advantages due to the ease of calibrating the ML model parameters.","PeriodicalId":187825,"journal":{"name":"2023 12th Mediterranean Conference on Embedded Computing (MECO)","volume":"89 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114443428","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Curve Reconstruction from Inclinometer Sensor Array for Aligning a Long Crane Rail 用倾角传感器阵列重建长起重机轨道对准曲线
Pub Date : 2023-06-06 DOI: 10.1109/MECO58584.2023.10154941
G. Rath, Gerold Probst, A. Lamprecht, Armin Hoffellner
A measurement device was developed that evaluates and displays the bending deformation of a crane with long horizontal extension used for construction work in a railway tunnel. The purpose is to adjust the crane rail vertically so that the trolley can move on a straight and smooth path. An array of inclinometer sensors measures the tilt angles along the machine. Piecewise interpolation with polynomials of third and second order is used to reconstruct the bending curve of the crane rail. The computer language Python with its library packages provides a good platform for the implementation of the algorithms, the user interface and the communication task. Evaluation is not done with the machine control hardware, but with a separate, rugged Rasperry Pi running under Linux operating system. With the optical display of the interpolated curve on a touch screen the operator is able to adjust the crane for the construction work.
研制了一种铁路隧道施工用长水平伸臂起重机弯曲变形的测量装置。其目的是垂直调整吊轨,使小车沿直线、平滑的轨迹运动。一组倾斜度传感器测量机器的倾斜度。采用三阶和二阶多项式分段插值法重构了起重机导轨弯曲曲线。计算机语言Python及其库包为实现算法、用户界面和通信任务提供了良好的平台。评估不是用机器控制硬件完成的,而是用在Linux操作系统下运行的一个单独的、坚固的Rasperry Pi完成的。通过在触摸屏上显示插值曲线的光学显示,操作人员可以调整起重机进行施工工作。
{"title":"Curve Reconstruction from Inclinometer Sensor Array for Aligning a Long Crane Rail","authors":"G. Rath, Gerold Probst, A. Lamprecht, Armin Hoffellner","doi":"10.1109/MECO58584.2023.10154941","DOIUrl":"https://doi.org/10.1109/MECO58584.2023.10154941","url":null,"abstract":"A measurement device was developed that evaluates and displays the bending deformation of a crane with long horizontal extension used for construction work in a railway tunnel. The purpose is to adjust the crane rail vertically so that the trolley can move on a straight and smooth path. An array of inclinometer sensors measures the tilt angles along the machine. Piecewise interpolation with polynomials of third and second order is used to reconstruct the bending curve of the crane rail. The computer language Python with its library packages provides a good platform for the implementation of the algorithms, the user interface and the communication task. Evaluation is not done with the machine control hardware, but with a separate, rugged Rasperry Pi running under Linux operating system. With the optical display of the interpolated curve on a touch screen the operator is able to adjust the crane for the construction work.","PeriodicalId":187825,"journal":{"name":"2023 12th Mediterranean Conference on Embedded Computing (MECO)","volume":"159 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128345255","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On Verifying Temporal Properties of Configurable Software 论可组态软件时间特性的验证
Pub Date : 2023-06-06 DOI: 10.1109/MECO58584.2023.10155049
Aleksandar S. Dimovski, B. Fetaji
Configurable software systems today are becoming very popular. They can produce a set of related programs by choosing preferable features (configuration options) at compile-time. Many configurable programs are applied in safety-critical areas, so their formal verification is of primary importance. In this paper, we introduce a new, interesting approach for verifying temporal properties of configurable programs that contain numerical features. We extend an abstract interpretation-based static analysis framework for proving temporal properties of single programs that uses a decision tree abstract domain. In particular, we define a novel lifted decision tree domain for proving temporal properties of configurable programs. We have developed a lifted static analyzer for proving temporal properties of #if-enriched C configurable programs. The evaluation on a range of loop benchmarks from SV-COMP confirms the effectiveness of our approach.
如今,可配置软件系统正变得非常流行。通过在编译时选择更合适的特性(配置选项),它们可以生成一组相关的程序。许多可配置程序应用于安全关键领域,因此它们的形式化验证是至关重要的。在本文中,我们介绍了一种新的、有趣的方法来验证包含数值特征的可配置程序的时间特性。我们扩展了一个基于抽象解释的静态分析框架,用于证明使用决策树抽象域的单个程序的时间属性。特别地,我们定义了一个新的提升决策树域来证明可配置程序的时间性质。我们开发了一个改进的静态分析器,用于验证富if的C可配置程序的时间特性。SV-COMP对一系列循环基准的评估证实了我们方法的有效性。
{"title":"On Verifying Temporal Properties of Configurable Software","authors":"Aleksandar S. Dimovski, B. Fetaji","doi":"10.1109/MECO58584.2023.10155049","DOIUrl":"https://doi.org/10.1109/MECO58584.2023.10155049","url":null,"abstract":"Configurable software systems today are becoming very popular. They can produce a set of related programs by choosing preferable features (configuration options) at compile-time. Many configurable programs are applied in safety-critical areas, so their formal verification is of primary importance. In this paper, we introduce a new, interesting approach for verifying temporal properties of configurable programs that contain numerical features. We extend an abstract interpretation-based static analysis framework for proving temporal properties of single programs that uses a decision tree abstract domain. In particular, we define a novel lifted decision tree domain for proving temporal properties of configurable programs. We have developed a lifted static analyzer for proving temporal properties of #if-enriched C configurable programs. The evaluation on a range of loop benchmarks from SV-COMP confirms the effectiveness of our approach.","PeriodicalId":187825,"journal":{"name":"2023 12th Mediterranean Conference on Embedded Computing (MECO)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129646657","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An overview of reinforcement learning techniques 强化学习技术概述
Pub Date : 2023-06-06 DOI: 10.1109/MECO58584.2023.10155066
Damjan Pecioski, V. Gavriloski, Simona Domazetovska, Anastasija Ignjatovska
Writing control code for a system where the optimal solution is not known in advance can be a very time-consuming process. The Artificial Intelligence (AI) methods typically involve designing a set of rules which can be effective in situations where the problem is precisely defined and well understood. As in real world problems the optimal solution is rarely known, the reinforcement learning framework which incorporates trial and error attempts can be used. Reinforcement learning (RL) is a machine learning technique that involves training an agent to make decisions which are based on the feedback it receives from the environment. One important decision to make when designing an RL system is whether to use a single or multiple agents. This decision depends on the type of problem that needs to be solved as well the environment complexity. Having a goal that can be achieved by a single agent (one player) it is recommended to use single-agent RL while if there is a need for coordination between multiple agents (players) then a multi-agent approach is recommended. In this article, the differences between single agent RL and multi agent RL techniques, as well as their advantages and disadvantages have been presented, and insights are provided into when one approach may be more appropriate than the other.
为一个事先不知道最优解的系统编写控制代码可能是一个非常耗时的过程。人工智能(AI)方法通常涉及设计一套规则,这些规则可以在问题精确定义和很好理解的情况下有效。由于在现实世界的问题中很少知道最优解,因此可以使用包含试错尝试的强化学习框架。强化学习(RL)是一种机器学习技术,它涉及训练智能体根据从环境中接收到的反馈做出决策。设计RL系统时要做的一个重要决定是使用单个还是多个代理。这个决定取决于需要解决的问题的类型以及环境的复杂性。如果目标可以通过单个代理(一个玩家)实现,则建议使用单代理强化学习,而如果需要在多个代理(玩家)之间进行协调,则建议使用多代理方法。在本文中,介绍了单代理强化学习和多代理强化学习技术之间的差异,以及它们的优点和缺点,并提供了一种方法何时比另一种方法更合适的见解。
{"title":"An overview of reinforcement learning techniques","authors":"Damjan Pecioski, V. Gavriloski, Simona Domazetovska, Anastasija Ignjatovska","doi":"10.1109/MECO58584.2023.10155066","DOIUrl":"https://doi.org/10.1109/MECO58584.2023.10155066","url":null,"abstract":"Writing control code for a system where the optimal solution is not known in advance can be a very time-consuming process. The Artificial Intelligence (AI) methods typically involve designing a set of rules which can be effective in situations where the problem is precisely defined and well understood. As in real world problems the optimal solution is rarely known, the reinforcement learning framework which incorporates trial and error attempts can be used. Reinforcement learning (RL) is a machine learning technique that involves training an agent to make decisions which are based on the feedback it receives from the environment. One important decision to make when designing an RL system is whether to use a single or multiple agents. This decision depends on the type of problem that needs to be solved as well the environment complexity. Having a goal that can be achieved by a single agent (one player) it is recommended to use single-agent RL while if there is a need for coordination between multiple agents (players) then a multi-agent approach is recommended. In this article, the differences between single agent RL and multi agent RL techniques, as well as their advantages and disadvantages have been presented, and insights are provided into when one approach may be more appropriate than the other.","PeriodicalId":187825,"journal":{"name":"2023 12th Mediterranean Conference on Embedded Computing (MECO)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126704304","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Exploring the Energy Metaverse: Potential Benefits and Challenges 探索能源元宇宙:潜在的利益和挑战
Pub Date : 2023-06-06 DOI: 10.1109/MECO58584.2023.10154906
M. Maksimovic, Marko Č. Bošković, T. Šekara, B. Lutovac
Technology advancements have a huge impact on conventional methods and practices, which causes the energy sector to undergo significant change. The digitalization of energy systems is what will undoubtedly shape the energy sector's future. The Metaverse may be the next phase of digitalization that will make the energy sector vastly different from what it does now, by providing exceptional chances to reorganize workflows, increase productivity, and reduce costs. Although the use of the Metaverse in the energy sector is still in its early stages, the popularity of the Energy Metaverse is rising as a result of its numerous advantages. Nevertheless, a number of challenges must be carefully considered for Metaverse to be widely adopted in the energy sector. This paper aims to provide a thorough overview of the Energy Metaverse in order to stimulate further research and hasten the adoption of this ground-breaking idea in the energy sector, which is currently lacking in research studies.
技术进步对传统方法和实践产生了巨大影响,这导致能源部门发生了重大变化。能源系统的数字化无疑将塑造能源行业的未来。Metaverse可能是数字化的下一个阶段,通过提供重组工作流程、提高生产力和降低成本的绝佳机会,将使能源行业与现在大不相同。虽然在能源领域使用Metaverse仍处于早期阶段,但由于其众多优势,能源Metaverse的受欢迎程度正在上升。然而,要想在能源领域广泛采用Metaverse,必须仔细考虑一些挑战。本文旨在提供能源元宇宙的全面概述,以刺激进一步的研究,并加快能源部门采用这一突破性的想法,这是目前缺乏的研究。
{"title":"Exploring the Energy Metaverse: Potential Benefits and Challenges","authors":"M. Maksimovic, Marko Č. Bošković, T. Šekara, B. Lutovac","doi":"10.1109/MECO58584.2023.10154906","DOIUrl":"https://doi.org/10.1109/MECO58584.2023.10154906","url":null,"abstract":"Technology advancements have a huge impact on conventional methods and practices, which causes the energy sector to undergo significant change. The digitalization of energy systems is what will undoubtedly shape the energy sector's future. The Metaverse may be the next phase of digitalization that will make the energy sector vastly different from what it does now, by providing exceptional chances to reorganize workflows, increase productivity, and reduce costs. Although the use of the Metaverse in the energy sector is still in its early stages, the popularity of the Energy Metaverse is rising as a result of its numerous advantages. Nevertheless, a number of challenges must be carefully considered for Metaverse to be widely adopted in the energy sector. This paper aims to provide a thorough overview of the Energy Metaverse in order to stimulate further research and hasten the adoption of this ground-breaking idea in the energy sector, which is currently lacking in research studies.","PeriodicalId":187825,"journal":{"name":"2023 12th Mediterranean Conference on Embedded Computing (MECO)","volume":"32 7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123227255","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2023 12th Mediterranean Conference on Embedded Computing (MECO)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1