Pub Date : 2023-06-08DOI: 10.1109/HORA58378.2023.10155778
Abdullah Enes Doruk, Müçteba Algül, Feyzullah Akyürek, Osman Kürşat Alpaydm, F. Uslu
The detection of objects in aerial images is impor-tant for many real world problems related to military defense, transportation, and etc. However, this is a challenging task as a result of the presence of various scales of objects in the same image, the large variety of contexts across aerial images, various brightness levels due to image acquisition at different times of the day and so on. To address these challenges, this paper introduces Saw-YOLOv5 for object detection in aerial images. Saw-YOLOv5 is a deep network based on YOLOv5, which was proposed for object detection in natural images. Saw-YOLOv5 extends YOLOv5 with the addition of several attention modules in its design. The results of our experiments, conducted on the aerial dataset delivered by the Turkey Technology Team for the Artificial Intelligence in Transportation Competition, showed that Saw-YOLOv5 outperforms previous methods, particularly for pedestrian detection, by yielding a mean mAP of 80.23% over all objects.
{"title":"Saw-YOLOv5: Scale-Aware YOLOv5 for Object Detection in Aerial Images","authors":"Abdullah Enes Doruk, Müçteba Algül, Feyzullah Akyürek, Osman Kürşat Alpaydm, F. Uslu","doi":"10.1109/HORA58378.2023.10155778","DOIUrl":"https://doi.org/10.1109/HORA58378.2023.10155778","url":null,"abstract":"The detection of objects in aerial images is impor-tant for many real world problems related to military defense, transportation, and etc. However, this is a challenging task as a result of the presence of various scales of objects in the same image, the large variety of contexts across aerial images, various brightness levels due to image acquisition at different times of the day and so on. To address these challenges, this paper introduces Saw-YOLOv5 for object detection in aerial images. Saw-YOLOv5 is a deep network based on YOLOv5, which was proposed for object detection in natural images. Saw-YOLOv5 extends YOLOv5 with the addition of several attention modules in its design. The results of our experiments, conducted on the aerial dataset delivered by the Turkey Technology Team for the Artificial Intelligence in Transportation Competition, showed that Saw-YOLOv5 outperforms previous methods, particularly for pedestrian detection, by yielding a mean mAP of 80.23% over all objects.","PeriodicalId":247679,"journal":{"name":"2023 5th International Congress on Human-Computer Interaction, Optimization and Robotic Applications (HORA)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131384380","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-06-08DOI: 10.1109/HORA58378.2023.10156744
Ahmet Turğut, Begum Korunur Engiz, E. Bayram
Özet—Bu çalışmada, 5G uygulamaları için Güven Bölgesi Çerçevesi algoritması kullanılarak, 28/38 GHz frekans bantlarında çalışan çift bantlı, ters-F şekilli anten tasarımı gerçekleştirilmiştir. Önerilen çift bantlı anten kompakt bir yapıya sahiptir ve çalışma kapsamındaki tüm benzetimler PCB baskılı devre kartı üzerinde gerçekleştirilmiştir. Algoritmaya bağlı olarak gerçekleştirilen optimizasyonlar sayesinde, 28 GHz ve 38 GHz frekans bantlarında, frekansta kayma olmaksızın, antenin mükemmel şekilde yayın yapması sağlanmıştır. CST STUDIO SUITE kullanılarak elde edilen benzetim sonuçları, tasarlanan antenin 28 GHz ve 38 GHz’de 25 dB kazanç sunduğunu göstermektedir. Bununla birlikte elde edilen, 27.593-28.365 GHz (%2.75) ve 37.3-38.557 GHz (%3.3) göreceli bant genişlikleri ve belirtilen frekans bantlarındaki ışıma örüntüleri, önerilen tasarımın 5G mobil iletişim için uygun bir aday olduğunu ortaya koymaktadır.
{"title":"Güven Bölgesi Çerçevesi Algoritması ile 28/38 GHz Anten Tasarımı","authors":"Ahmet Turğut, Begum Korunur Engiz, E. Bayram","doi":"10.1109/HORA58378.2023.10156744","DOIUrl":"https://doi.org/10.1109/HORA58378.2023.10156744","url":null,"abstract":"Özet—Bu çalışmada, 5G uygulamaları için Güven Bölgesi Çerçevesi algoritması kullanılarak, 28/38 GHz frekans bantlarında çalışan çift bantlı, ters-F şekilli anten tasarımı gerçekleştirilmiştir. Önerilen çift bantlı anten kompakt bir yapıya sahiptir ve çalışma kapsamındaki tüm benzetimler PCB baskılı devre kartı üzerinde gerçekleştirilmiştir. Algoritmaya bağlı olarak gerçekleştirilen optimizasyonlar sayesinde, 28 GHz ve 38 GHz frekans bantlarında, frekansta kayma olmaksızın, antenin mükemmel şekilde yayın yapması sağlanmıştır. CST STUDIO SUITE kullanılarak elde edilen benzetim sonuçları, tasarlanan antenin 28 GHz ve 38 GHz’de 25 dB kazanç sunduğunu göstermektedir. Bununla birlikte elde edilen, 27.593-28.365 GHz (%2.75) ve 37.3-38.557 GHz (%3.3) göreceli bant genişlikleri ve belirtilen frekans bantlarındaki ışıma örüntüleri, önerilen tasarımın 5G mobil iletişim için uygun bir aday olduğunu ortaya koymaktadır.","PeriodicalId":247679,"journal":{"name":"2023 5th International Congress on Human-Computer Interaction, Optimization and Robotic Applications (HORA)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133830664","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-06-08DOI: 10.1109/HORA58378.2023.10156669
Fawaz Y. Abdullah, M. T. Yaseen, Firas S. Alsharbaty
To protect conventional energy supplies and maintain the sustainable growth of society, electric vehicle charging stations connected to the network are combined with renewable energies. The green (renewable) energy storage system in the charging stations not only allows for uncomplicated charging but also allows for quick grid demand variations. The instability of renewable energy is the key obstacle in this notion. As the charging station's energy storage system is directly connected to a solar panel or other renewable energy source, the converter should be able to produce a regulated output of the necessary magnitude in response to fluctuating and insufficient input power. Under circumstances of high gain, using a traditional converter for this purpose will lead to low charging efficiency. This work submits a hybrid synchronous back (HSB) converter to compensate the mentioned issue. The maximum efficiency is handled for a variable input range of 15–45 V to offer 14 V in term of output voltage. The work is validated by design a 200W HSB converter prototype.
{"title":"Design and implementation of power convertor circuit toward electric vehicle charging applications","authors":"Fawaz Y. Abdullah, M. T. Yaseen, Firas S. Alsharbaty","doi":"10.1109/HORA58378.2023.10156669","DOIUrl":"https://doi.org/10.1109/HORA58378.2023.10156669","url":null,"abstract":"To protect conventional energy supplies and maintain the sustainable growth of society, electric vehicle charging stations connected to the network are combined with renewable energies. The green (renewable) energy storage system in the charging stations not only allows for uncomplicated charging but also allows for quick grid demand variations. The instability of renewable energy is the key obstacle in this notion. As the charging station's energy storage system is directly connected to a solar panel or other renewable energy source, the converter should be able to produce a regulated output of the necessary magnitude in response to fluctuating and insufficient input power. Under circumstances of high gain, using a traditional converter for this purpose will lead to low charging efficiency. This work submits a hybrid synchronous back (HSB) converter to compensate the mentioned issue. The maximum efficiency is handled for a variable input range of 15–45 V to offer 14 V in term of output voltage. The work is validated by design a 200W HSB converter prototype.","PeriodicalId":247679,"journal":{"name":"2023 5th International Congress on Human-Computer Interaction, Optimization and Robotic Applications (HORA)","volume":"97 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133909908","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-06-08DOI: 10.1109/HORA58378.2023.10156716
Tunç Taner, Hasan Tolga Ünal, A. Mendi, Ömer Özkan, M. A. Nacar
Artificial intelligence (AI) is being utilized in various fields today to automate business processes, optimize decision-making processes, and contribute to the development of diverse applications that aim to improve life quality. This study examines the installation of a computer vision and central video management system that aims to enhance passenger satisfaction, local government reputation, and traffic safety in buses. Image data collected through IP cameras and NVR devices are analyzed by a computer vision system based on Convolutional Neural Networks (CNN). The analysis is used to detect prominent behaviors such as smoking, not wearing seat belts, or using mobile phones while driving. The study demonstrates that this technology plays a significant role in identifying and potentially preventing specific behaviors of bus drivers. The system highlights the potential of such technology to enable central control and management of public transportation systems, enhance the overall quality and safety of bus services, and emphasizes the future potential benefits. The results indicate a decrease of approximately 93% in these behaviors after implementing the system, thus achieving its intended purpose.
{"title":"Artificial Intelligence Based Transportation System","authors":"Tunç Taner, Hasan Tolga Ünal, A. Mendi, Ömer Özkan, M. A. Nacar","doi":"10.1109/HORA58378.2023.10156716","DOIUrl":"https://doi.org/10.1109/HORA58378.2023.10156716","url":null,"abstract":"Artificial intelligence (AI) is being utilized in various fields today to automate business processes, optimize decision-making processes, and contribute to the development of diverse applications that aim to improve life quality. This study examines the installation of a computer vision and central video management system that aims to enhance passenger satisfaction, local government reputation, and traffic safety in buses. Image data collected through IP cameras and NVR devices are analyzed by a computer vision system based on Convolutional Neural Networks (CNN). The analysis is used to detect prominent behaviors such as smoking, not wearing seat belts, or using mobile phones while driving. The study demonstrates that this technology plays a significant role in identifying and potentially preventing specific behaviors of bus drivers. The system highlights the potential of such technology to enable central control and management of public transportation systems, enhance the overall quality and safety of bus services, and emphasizes the future potential benefits. The results indicate a decrease of approximately 93% in these behaviors after implementing the system, thus achieving its intended purpose.","PeriodicalId":247679,"journal":{"name":"2023 5th International Congress on Human-Computer Interaction, Optimization and Robotic Applications (HORA)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134046937","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-06-08DOI: 10.1109/HORA58378.2023.10155774
Mohammed Hassan Mohammed Alhejaili, Roslina Ibrahim
Since of the Internet and new technologies, eLearning has emerged as the most viable option. The undeniable significance of e-learning in the sphere of education has led in a rapid increase in the number of e-learning courses and systems that offer a broad range of educational services to their users. There is a lack of studies regarding the use of electronic learning (eLearning) to improve teaching and learning in educational institutions. Several UX evaluation studies of eLearning simply contain dimensions and criteria in the literature study. However, the UX factors, criteria, and metrics are lacking from the UX evaluation models. The objectives of this research are to identify the most related models used to assess user experience in eLearning as well as to determine the prevalence of study location namely, schools or higher education. This review includes, among other things, various publications that were published between the years 2017 and 2022. The discussion mainly focused on the current issues that are being faced by the field, as well as the opportunities for research that exist in the domain.
{"title":"Review of User Experience Models in The Context of eLearning Setting","authors":"Mohammed Hassan Mohammed Alhejaili, Roslina Ibrahim","doi":"10.1109/HORA58378.2023.10155774","DOIUrl":"https://doi.org/10.1109/HORA58378.2023.10155774","url":null,"abstract":"Since of the Internet and new technologies, eLearning has emerged as the most viable option. The undeniable significance of e-learning in the sphere of education has led in a rapid increase in the number of e-learning courses and systems that offer a broad range of educational services to their users. There is a lack of studies regarding the use of electronic learning (eLearning) to improve teaching and learning in educational institutions. Several UX evaluation studies of eLearning simply contain dimensions and criteria in the literature study. However, the UX factors, criteria, and metrics are lacking from the UX evaluation models. The objectives of this research are to identify the most related models used to assess user experience in eLearning as well as to determine the prevalence of study location namely, schools or higher education. This review includes, among other things, various publications that were published between the years 2017 and 2022. The discussion mainly focused on the current issues that are being faced by the field, as well as the opportunities for research that exist in the domain.","PeriodicalId":247679,"journal":{"name":"2023 5th International Congress on Human-Computer Interaction, Optimization and Robotic Applications (HORA)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131291861","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-06-08DOI: 10.1109/HORA58378.2023.10156680
Mukaram Safaldin, Nizar Zaghden, M. Mejdoub
Object detection is a crucial aspect of computer vision, and deep learning has led to significant advancements in this area. Object categorization, segmentation, and localization have been improved with the use of deep models. Two-stage detectors have higher identification precision, while single-stage detectors have better inference times. You Only Look Once (YOLO) and its successors have shown improved detection accuracy and speed, making them popular in a wide range of applications. This paper proposes an improved YOLO-v2 for detecting tiny objects. The proposed detector is evaluated using the VOC 2012 benchmark dataset, and the experimental results show that it outperforms state-of-the-art detectors in terms of detection accuracy, precision, recall, and IOU. The proposed detector achieved 95.8% detection accuracy, 96.1% precision, 95.5% recall, and 95% IOU.
目标检测是计算机视觉的一个重要方面,深度学习在这一领域取得了重大进展。使用深度模型改进了对象分类、分割和定位。两级检测器具有较高的识别精度,而单级检测器具有较好的推理时间。You Only Look Once (YOLO)及其后续产品显示出更高的检测精度和速度,使其在广泛的应用中广受欢迎。本文提出了一种改进的YOLO-v2用于微小目标的检测。使用VOC 2012基准数据集对所提出的检测器进行了评估,实验结果表明,它在检测准确性、精密度、召回率和IOU方面优于最先进的检测器。该检测器的检测准确率为95.8%,精密度为96.1%,召回率为95.5%,IOU为95%。
{"title":"Moving Object Detection Based on Enhanced Yolo-V2 Model","authors":"Mukaram Safaldin, Nizar Zaghden, M. Mejdoub","doi":"10.1109/HORA58378.2023.10156680","DOIUrl":"https://doi.org/10.1109/HORA58378.2023.10156680","url":null,"abstract":"Object detection is a crucial aspect of computer vision, and deep learning has led to significant advancements in this area. Object categorization, segmentation, and localization have been improved with the use of deep models. Two-stage detectors have higher identification precision, while single-stage detectors have better inference times. You Only Look Once (YOLO) and its successors have shown improved detection accuracy and speed, making them popular in a wide range of applications. This paper proposes an improved YOLO-v2 for detecting tiny objects. The proposed detector is evaluated using the VOC 2012 benchmark dataset, and the experimental results show that it outperforms state-of-the-art detectors in terms of detection accuracy, precision, recall, and IOU. The proposed detector achieved 95.8% detection accuracy, 96.1% precision, 95.5% recall, and 95% IOU.","PeriodicalId":247679,"journal":{"name":"2023 5th International Congress on Human-Computer Interaction, Optimization and Robotic Applications (HORA)","volume":"130 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133765502","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-06-08DOI: 10.1109/HORA58378.2023.10156664
Y. Sokol, O. Trush, S. Yevseiev, O. Milov
The development of smart technologies, the growth of computing capabilities allows us to expand the range of services in educational institutions. In addition, prerequisites are being formed for the integration of management functions with the educational functions of the university, which makes it possible to form a new type - an active innovative university. This approach allows us to transform not only digital education services, but also the formation of a start-up orientation and entrepreneurial activity among students, the formation of electronic document management based on modern technologies. In addition, an active innovative university, the university of the future education platform 5.0, requires the deployment of a corporate information and educational system (CIES) of the university, in which almost all functions are integrated. The paper proposes a model for deploying a corporate ITS that allows you to form the prerequisites for the transition to the education platform 5.0, in which, based on the Concept of multi-loop security, it is proposed to provide counteraction to modern targeted threats. It is proposed to use a key certification center based on the X.509 standard as the basis for the security system and functionality of the KIOS, which will expand the range of digitalization of the university's web platform and ensure an increase in the university's rating in the Webometrics assessment system.
{"title":"Implementation of Information and Communication Technologies in the Educational Process","authors":"Y. Sokol, O. Trush, S. Yevseiev, O. Milov","doi":"10.1109/HORA58378.2023.10156664","DOIUrl":"https://doi.org/10.1109/HORA58378.2023.10156664","url":null,"abstract":"The development of smart technologies, the growth of computing capabilities allows us to expand the range of services in educational institutions. In addition, prerequisites are being formed for the integration of management functions with the educational functions of the university, which makes it possible to form a new type - an active innovative university. This approach allows us to transform not only digital education services, but also the formation of a start-up orientation and entrepreneurial activity among students, the formation of electronic document management based on modern technologies. In addition, an active innovative university, the university of the future education platform 5.0, requires the deployment of a corporate information and educational system (CIES) of the university, in which almost all functions are integrated. The paper proposes a model for deploying a corporate ITS that allows you to form the prerequisites for the transition to the education platform 5.0, in which, based on the Concept of multi-loop security, it is proposed to provide counteraction to modern targeted threats. It is proposed to use a key certification center based on the X.509 standard as the basis for the security system and functionality of the KIOS, which will expand the range of digitalization of the university's web platform and ensure an increase in the university's rating in the Webometrics assessment system.","PeriodicalId":247679,"journal":{"name":"2023 5th International Congress on Human-Computer Interaction, Optimization and Robotic Applications (HORA)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133716794","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-06-08DOI: 10.1109/HORA58378.2023.10156694
N. Valov
This paper describes an example of project-based teaching of students in engineering courses, oriented in automation and control, IoT and development of smart systems. In classical types of teaching students are the passive side and are expected to memorize the information presented by the lecturers. Project-based learning provokes thinking and helps motivate learners. An exemplary solution is described by a student team that developed, together with a teacher, a system for monitoring environmental indicators inside and outside a room for raising chickens and for controlling the door of the room according to the light outside. Blynk is used as a development platform for the software part of the system. A general architecture of hardware modules of the system, circuit diagram and screens of the software subsystem are presented. Working on the project helped the students a lot to become more confident and ambitious, successfully solving the small tasks of the project motivated them to finish it on time.
{"title":"Project-based Teaching of Students with Development of a Smart Control of the Free Range Chicken House","authors":"N. Valov","doi":"10.1109/HORA58378.2023.10156694","DOIUrl":"https://doi.org/10.1109/HORA58378.2023.10156694","url":null,"abstract":"This paper describes an example of project-based teaching of students in engineering courses, oriented in automation and control, IoT and development of smart systems. In classical types of teaching students are the passive side and are expected to memorize the information presented by the lecturers. Project-based learning provokes thinking and helps motivate learners. An exemplary solution is described by a student team that developed, together with a teacher, a system for monitoring environmental indicators inside and outside a room for raising chickens and for controlling the door of the room according to the light outside. Blynk is used as a development platform for the software part of the system. A general architecture of hardware modules of the system, circuit diagram and screens of the software subsystem are presented. Working on the project helped the students a lot to become more confident and ambitious, successfully solving the small tasks of the project motivated them to finish it on time.","PeriodicalId":247679,"journal":{"name":"2023 5th International Congress on Human-Computer Interaction, Optimization and Robotic Applications (HORA)","volume":"17 12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115728304","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-06-08DOI: 10.1109/HORA58378.2023.10156777
A. Kaplan, FŅrat Hardalaç, Fatih Uysal
In today's aviation industry, the production of avionic equipment that adheres to the compulsory standards for both military and civilian avionic systems is essential. For this reason, as a result of various studies carried out within the scope of the application of the relevant standards to avionic equipment, additional labor and financial expenditures are needed by the manufacturers. It is necessary to provide access to the programmable integrated circuits of the relevant avionic equipment in order to change the configurations of these avionic equipment. This implies that the avionic equipment needs to be opened, physically. This situation leads to the re-application of some test practices included in the standards related to environmental conditions and tests such as MIL-STD-160 and DO-160, to which the aircraft is subject, to the aforementioned avionic equipment. Thus, the repetition of many test procedures previously specified as a requirement by the standard occurs. As a result of the repetition of these tests, it is inevitable that extra labor and financial expenses arise. The fact that the relevant workforce and expenditures are made within the scope of avionic equipment whose design and production process has been completed cause manufacturers not to provide the necessary importance and financial contribution to their new projects. In order to eliminate these problems, within the scope of the subject of the paper, a design architecture that will enable the configuration update of the programmable integrated circuit with Joint Test Action Group (JTAG) interface using JTAG to Universal Serial Bus (USB) converter integrated circuit via Wi-Fi has been created. In addition, studies to ensure the security of the wireless network to be used within the scope of the related design architecture are also mentioned. This design architecture allows configuration updates to be made over the secure network without opening avionic equipment physically, eliminating the expected additional labor and financial costs.
在当今的航空工业中,生产符合军用和民用航空电子系统强制标准的航空电子设备是必不可少的。因此,在航空电子设备适用相关标准的范围内进行了各种研究,制造商需要额外的劳动力和财务支出。为了改变这些航空电子设备的配置,有必要提供对相关航空电子设备的可编程集成电路的访问。这意味着航空电子设备需要从物理上打开。这种情况导致对上述航空电子设备重新采用与环境条件和测试有关的标准中的一些测试方法,例如飞机必须遵守的MIL-STD-160和DO-160。因此,许多先前被标准规定为要求的测试过程的重复出现。由于这些测试的重复,不可避免地会产生额外的劳动力和财务费用。有关的人力和支出都是在设计和生产过程已经完成的航空电子设备范围内进行的,这一事实导致制造商没有为其新项目提供必要的重要性和财政贡献。为了消除这些问题,在本文的主题范围内,创建了一种设计架构,使具有JTAG (Joint Test Action Group,联合测试行动组)接口的可编程集成电路能够通过Wi-Fi通过JTAG与通用串行总线(USB)转换集成电路进行配置更新。此外,还对在相关设计架构范围内保证无线网络使用的安全性进行了研究。这种设计架构允许在不打开航空电子设备的情况下通过安全网络进行配置更新,从而消除了预期的额外劳动力和财务成本。
{"title":"Wireless JTAG to USB Emulator Architecture","authors":"A. Kaplan, FŅrat Hardalaç, Fatih Uysal","doi":"10.1109/HORA58378.2023.10156777","DOIUrl":"https://doi.org/10.1109/HORA58378.2023.10156777","url":null,"abstract":"In today's aviation industry, the production of avionic equipment that adheres to the compulsory standards for both military and civilian avionic systems is essential. For this reason, as a result of various studies carried out within the scope of the application of the relevant standards to avionic equipment, additional labor and financial expenditures are needed by the manufacturers. It is necessary to provide access to the programmable integrated circuits of the relevant avionic equipment in order to change the configurations of these avionic equipment. This implies that the avionic equipment needs to be opened, physically. This situation leads to the re-application of some test practices included in the standards related to environmental conditions and tests such as MIL-STD-160 and DO-160, to which the aircraft is subject, to the aforementioned avionic equipment. Thus, the repetition of many test procedures previously specified as a requirement by the standard occurs. As a result of the repetition of these tests, it is inevitable that extra labor and financial expenses arise. The fact that the relevant workforce and expenditures are made within the scope of avionic equipment whose design and production process has been completed cause manufacturers not to provide the necessary importance and financial contribution to their new projects. In order to eliminate these problems, within the scope of the subject of the paper, a design architecture that will enable the configuration update of the programmable integrated circuit with Joint Test Action Group (JTAG) interface using JTAG to Universal Serial Bus (USB) converter integrated circuit via Wi-Fi has been created. In addition, studies to ensure the security of the wireless network to be used within the scope of the related design architecture are also mentioned. This design architecture allows configuration updates to be made over the secure network without opening avionic equipment physically, eliminating the expected additional labor and financial costs.","PeriodicalId":247679,"journal":{"name":"2023 5th International Congress on Human-Computer Interaction, Optimization and Robotic Applications (HORA)","volume":"101 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124713534","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-06-08DOI: 10.1109/HORA58378.2023.10156745
Omar Omran, Wassim Alexan
The rapidly increasing transmission of multimedia through the Internet and insecure communication channels is challenging scientists and engineers to develop efficient security measures. An image encryption algorithm is proposed in this paper to help solve such a problem. The proposed algorithm is carried out in 3 stages. The first stage employs Rule 30 cellular automata to generate the first encryption key. The second stage makes use of a tried-and-true S-box. Finally, in the third stage, DNA encoding is used to generate the second encryption key. The overall effect of this 3-stage process ensures that a cryptographic system's Shannon's confusion and diffusion properties are employed, thereby improving the security and robustness of the resulting encrypted images.
{"title":"Cellular Automata, S-Box and DNA Coding Based SPN for Image Encryption","authors":"Omar Omran, Wassim Alexan","doi":"10.1109/HORA58378.2023.10156745","DOIUrl":"https://doi.org/10.1109/HORA58378.2023.10156745","url":null,"abstract":"The rapidly increasing transmission of multimedia through the Internet and insecure communication channels is challenging scientists and engineers to develop efficient security measures. An image encryption algorithm is proposed in this paper to help solve such a problem. The proposed algorithm is carried out in 3 stages. The first stage employs Rule 30 cellular automata to generate the first encryption key. The second stage makes use of a tried-and-true S-box. Finally, in the third stage, DNA encoding is used to generate the second encryption key. The overall effect of this 3-stage process ensures that a cryptographic system's Shannon's confusion and diffusion properties are employed, thereby improving the security and robustness of the resulting encrypted images.","PeriodicalId":247679,"journal":{"name":"2023 5th International Congress on Human-Computer Interaction, Optimization and Robotic Applications (HORA)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128968486","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}