首页 > 最新文献

2022 IEEE 2nd Conference on Information Technology and Data Science (CITDS)最新文献

英文 中文
Neural Network-Based Prediction for Lateral Acceleration of Vehicles 基于神经网络的车辆横向加速度预测
Pub Date : 2022-05-16 DOI: 10.1109/CITDS54976.2022.9914270
János Kontos, B. Kránicz, Ágnes Vathy-Fogarassy
Lateral acceleration is a key element of vehicle dynamics. It is consumed by several control, stability and comfort functions of the vehicle. In this paper a neural network-based prediction method is demonstrated for predicting the value of lateral acceleration. The inputs of the method are the most accessible signals in any modern vehicle: wheel speed information, longitudinal acceleration and steering wheel angle. For training, validating and testing the neural network, experimental data was used. The hyperparameters of the neural network were tuned by a hybrid approach. The accuracy of the approach was evaluated by comparing the actual measured values to those predicted by the neural network. Evaluation results convincingly demonstrate the usefulness and reliability of the developed model.
横向加速度是车辆动力学的一个关键因素。它消耗了车辆的几个控制、稳定和舒适功能。本文提出了一种基于神经网络的横向加速度预测方法。该方法的输入是任何现代车辆中最容易获得的信号:车轮速度信息、纵向加速度和方向盘角度。为了训练、验证和测试神经网络,使用了实验数据。采用混合方法对神经网络的超参数进行整定。通过将实际测量值与神经网络预测值进行比较,评价了该方法的准确性。评价结果令人信服地证明了所建立模型的有效性和可靠性。
{"title":"Neural Network-Based Prediction for Lateral Acceleration of Vehicles","authors":"János Kontos, B. Kránicz, Ágnes Vathy-Fogarassy","doi":"10.1109/CITDS54976.2022.9914270","DOIUrl":"https://doi.org/10.1109/CITDS54976.2022.9914270","url":null,"abstract":"Lateral acceleration is a key element of vehicle dynamics. It is consumed by several control, stability and comfort functions of the vehicle. In this paper a neural network-based prediction method is demonstrated for predicting the value of lateral acceleration. The inputs of the method are the most accessible signals in any modern vehicle: wheel speed information, longitudinal acceleration and steering wheel angle. For training, validating and testing the neural network, experimental data was used. The hyperparameters of the neural network were tuned by a hybrid approach. The accuracy of the approach was evaluated by comparing the actual measured values to those predicted by the neural network. Evaluation results convincingly demonstrate the usefulness and reliability of the developed model.","PeriodicalId":271992,"journal":{"name":"2022 IEEE 2nd Conference on Information Technology and Data Science (CITDS)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115163589","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Comparative Analysis of Deep Learning Models for Network Intrusion Detection Systems 网络入侵检测系统深度学习模型的比较分析
Pub Date : 2022-05-16 DOI: 10.1109/CITDS54976.2022.9914128
Brenton Budler, Ritesh Ajoodha
Detecting network intrusions is an imperative part of the modern cybersecurity landscape. Over the years, researchers have leveraged the ability of Machine Learning to identify and prevent network attacks. Recently there has been an increased interest in the applicability of Deep Learning in the network intrusion detection domain. However, Network Intrusion Detection Systems developed using Deep Learning approaches are being evaluated using the outdated KDD Cup 99 and NSLKDD datasets which are not representative of real-world network traffic. Recent comparisons of these approaches on the more modern CSE-CIC-IDS2018 dataset, fail to address the severe class imbalance in the dataset which leads to significantly biased results. By addressing this class imbalance and performing an experimental evaluation of a Deep Neural Network, Convolutional Neural Network and Long Short-Term Memory Network on the balanced dataset, this research provides deeper insights into the performance of these models in classifying modern network traffic data. The Deep Neural Network demonstrated the best classification performance with the highest accuracy (84.312%) and Fl-Score (83.799%) as well as the lowest False Alarm Rate (2.615%).
检测网络入侵是现代网络安全领域必不可少的一部分。多年来,研究人员利用机器学习的能力来识别和防止网络攻击。最近,人们对深度学习在网络入侵检测领域的适用性越来越感兴趣。然而,使用深度学习方法开发的网络入侵检测系统正在使用过时的KDD Cup 99和NSLKDD数据集进行评估,这些数据集不能代表现实世界的网络流量。最近在更现代的CSE-CIC-IDS2018数据集上对这些方法的比较,未能解决数据集中严重的类别不平衡,导致结果显着偏倚。通过解决这类不平衡问题,并在平衡数据集上对深度神经网络、卷积神经网络和长短期记忆网络进行实验评估,本研究为这些模型在现代网络流量数据分类中的性能提供了更深入的见解。其中,Deep Neural Network的分类准确率最高(84.312%),Fl-Score最高(83.799%),虚警率最低(2.615%)。
{"title":"Comparative Analysis of Deep Learning Models for Network Intrusion Detection Systems","authors":"Brenton Budler, Ritesh Ajoodha","doi":"10.1109/CITDS54976.2022.9914128","DOIUrl":"https://doi.org/10.1109/CITDS54976.2022.9914128","url":null,"abstract":"Detecting network intrusions is an imperative part of the modern cybersecurity landscape. Over the years, researchers have leveraged the ability of Machine Learning to identify and prevent network attacks. Recently there has been an increased interest in the applicability of Deep Learning in the network intrusion detection domain. However, Network Intrusion Detection Systems developed using Deep Learning approaches are being evaluated using the outdated KDD Cup 99 and NSLKDD datasets which are not representative of real-world network traffic. Recent comparisons of these approaches on the more modern CSE-CIC-IDS2018 dataset, fail to address the severe class imbalance in the dataset which leads to significantly biased results. By addressing this class imbalance and performing an experimental evaluation of a Deep Neural Network, Convolutional Neural Network and Long Short-Term Memory Network on the balanced dataset, this research provides deeper insights into the performance of these models in classifying modern network traffic data. The Deep Neural Network demonstrated the best classification performance with the highest accuracy (84.312%) and Fl-Score (83.799%) as well as the lowest False Alarm Rate (2.615%).","PeriodicalId":271992,"journal":{"name":"2022 IEEE 2nd Conference on Information Technology and Data Science (CITDS)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122081106","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multimodal Feature Extraction for Memes Sentiment Classification 模因情感分类的多模态特征提取
Pub Date : 2022-05-16 DOI: 10.1109/CITDS54976.2022.9914260
Sofiane Ouaari, Tsegaye Misikir Tashu, Tomáš Horváth
In this study, we propose feature extraction for multimodal meme classification using Deep Learning approaches. A meme is usually a photo or video with text shared by the young generation on social media platforms that expresses a culturally relevant idea. Since they are an efficient way to express emotions and feelings, a good classifier that can classify the sentiment behind the meme is important. To make the learning process more efficient, reduce the likelihood of overfitting, and improve the generalizability of the model, one needs a good approach for joint feature extraction from all modalities. In this work, we proposed to use different multimodal neural network approaches for multimodal feature extraction and use the extracted features to train a classifier to identify the sentiment in a meme.
在这项研究中,我们提出了使用深度学习方法进行多模态模因分类的特征提取。模因通常是年轻一代在社交媒体平台上分享的带有文字的照片或视频,表达与文化相关的想法。由于它们是表达情绪和感受的有效方式,因此能够对模因背后的情绪进行分类的优秀分类器非常重要。为了提高学习过程的效率,减少过拟合的可能性,提高模型的可泛化性,需要一种好的方法来从所有模态中联合提取特征。在这项工作中,我们提出使用不同的多模态神经网络方法进行多模态特征提取,并使用提取的特征来训练分类器来识别模因中的情感。
{"title":"Multimodal Feature Extraction for Memes Sentiment Classification","authors":"Sofiane Ouaari, Tsegaye Misikir Tashu, Tomáš Horváth","doi":"10.1109/CITDS54976.2022.9914260","DOIUrl":"https://doi.org/10.1109/CITDS54976.2022.9914260","url":null,"abstract":"In this study, we propose feature extraction for multimodal meme classification using Deep Learning approaches. A meme is usually a photo or video with text shared by the young generation on social media platforms that expresses a culturally relevant idea. Since they are an efficient way to express emotions and feelings, a good classifier that can classify the sentiment behind the meme is important. To make the learning process more efficient, reduce the likelihood of overfitting, and improve the generalizability of the model, one needs a good approach for joint feature extraction from all modalities. In this work, we proposed to use different multimodal neural network approaches for multimodal feature extraction and use the extracted features to train a classifier to identify the sentiment in a meme.","PeriodicalId":271992,"journal":{"name":"2022 IEEE 2nd Conference on Information Technology and Data Science (CITDS)","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127581033","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A multi-round bilinear-map-based secure password hashing scheme 基于多轮双线性映射的安全密码哈希方案
Pub Date : 2022-05-16 DOI: 10.1109/CITDS54976.2022.9914189
Csaád Bertók, Andrea Huszti, Tamás Kádek, Zsanett Jámbor
We construct a multi-round, secure password hashing scheme that is designed to be resistant against off-line attacks, such as brute force, dictionary and rainbow table attacks. We compare our scheme to the password hashing algorithms used in practice from the point of view of the technical requirements of the Password Hashing Competition. We provide a security analysis, which shows that the proposed algorithm is also collision, hence second pre-image resistant.
我们构建了一个多轮、安全的密码哈希方案,该方案旨在抵抗离线攻击,如暴力破解、字典和彩虹表攻击。我们从密码哈希竞赛的技术要求的角度,将我们的方案与实际使用的密码哈希算法进行比较。我们提供了一个安全性分析,表明该算法也具有碰撞性,因此可以抵抗第二次预图像。
{"title":"A multi-round bilinear-map-based secure password hashing scheme","authors":"Csaád Bertók, Andrea Huszti, Tamás Kádek, Zsanett Jámbor","doi":"10.1109/CITDS54976.2022.9914189","DOIUrl":"https://doi.org/10.1109/CITDS54976.2022.9914189","url":null,"abstract":"We construct a multi-round, secure password hashing scheme that is designed to be resistant against off-line attacks, such as brute force, dictionary and rainbow table attacks. We compare our scheme to the password hashing algorithms used in practice from the point of view of the technical requirements of the Password Hashing Competition. We provide a security analysis, which shows that the proposed algorithm is also collision, hence second pre-image resistant.","PeriodicalId":271992,"journal":{"name":"2022 IEEE 2nd Conference on Information Technology and Data Science (CITDS)","volume":"56 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120861687","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analysis of a typical cell in the uplink cellular network model using stochastic simulation 用随机仿真方法分析上行蜂窝网络中的典型蜂窝模型
Pub Date : 2022-05-16 DOI: 10.1109/CITDS54976.2022.9914210
Taisiia Morozova, I. Kaj
In this work we consider an uplink cellular network with the focus on a typical cell rather than the whole network. The base stations (BSs) and the users are distributed according to Poisson point processes (PPP) and the signals are transmitted at random power. The BSs’ serving area is formed according to the Voronoi diagram and the users are associated with a serving BS based on the shortest distance. One of the features of the system is that we primarily take into account the interference inside a d-dimensional ball of the average size of a typical Voronoi cell. In this work we mainly focus on the system stability and discuss a necessary stability condition, which is then studied by using stochastic simulation. We also discuss some properties of the network that can affect the stability and appear to be interesting and promising for the performance analysis of the system.
在这项工作中,我们考虑了一个上行蜂窝网络,其重点是一个典型的蜂窝而不是整个网络。基站和用户按泊松点过程(PPP)进行分布,信号以随机功率传输。根据Voronoi图形成基站的服务区域,用户根据最短距离与服务基站关联。该系统的特点之一是我们主要考虑了典型Voronoi细胞平均尺寸的d维球内部的干扰。本文主要讨论了系统的稳定性问题,并讨论了一个必要的稳定条件,然后用随机模拟的方法对其进行了研究。我们还讨论了可能影响稳定性的网络的一些特性,这些特性对于系统的性能分析似乎是有趣的和有希望的。
{"title":"Analysis of a typical cell in the uplink cellular network model using stochastic simulation","authors":"Taisiia Morozova, I. Kaj","doi":"10.1109/CITDS54976.2022.9914210","DOIUrl":"https://doi.org/10.1109/CITDS54976.2022.9914210","url":null,"abstract":"In this work we consider an uplink cellular network with the focus on a typical cell rather than the whole network. The base stations (BSs) and the users are distributed according to Poisson point processes (PPP) and the signals are transmitted at random power. The BSs’ serving area is formed according to the Voronoi diagram and the users are associated with a serving BS based on the shortest distance. One of the features of the system is that we primarily take into account the interference inside a d-dimensional ball of the average size of a typical Voronoi cell. In this work we mainly focus on the system stability and discuss a necessary stability condition, which is then studied by using stochastic simulation. We also discuss some properties of the network that can affect the stability and appear to be interesting and promising for the performance analysis of the system.","PeriodicalId":271992,"journal":{"name":"2022 IEEE 2nd Conference on Information Technology and Data Science (CITDS)","volume":"22 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114115740","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Smart watch activity recognition using plot image analysis 基于情节图像分析的智能手表活动识别
Pub Date : 2022-05-16 DOI: 10.1109/CITDS54976.2022.9914230
A. Alexan, Anca Alexan, S. Oniga
Nowadays, many of us wear multiple devices capable of acquiring and storing data related to our everyday activities. Since the computing power of mobile battery-operated devices slowly increases and the power optimizations allow for more and more continuous use, these devices are capable of not only monitoring our activity but analyzing the activity as well. Of these devices, the smartwatch is probably the most inconspicuous, and due to its widespread use, we have used accelerometer data gathered from a smartwatch to identify common user activities by using image generated plots and image recognition machine learning. By leveraging the.Net ML.NET machine learning framework we have managed to obtain a decent recognition rate.
如今,我们中的许多人都佩戴着多种设备,能够获取和存储与我们日常活动相关的数据。由于移动电池供电设备的计算能力缓慢增加,并且功率优化允许越来越多的连续使用,这些设备不仅能够监控我们的活动,还能够分析活动。在这些设备中,智能手表可能是最不显眼的,由于它的广泛使用,我们使用从智能手表收集的加速度计数据,通过使用图像生成图和图像识别机器学习来识别常见的用户活动。通过杠杆作用。Net ML.NET机器学习框架,我们已经设法获得了一个体面的识别率。
{"title":"Smart watch activity recognition using plot image analysis","authors":"A. Alexan, Anca Alexan, S. Oniga","doi":"10.1109/CITDS54976.2022.9914230","DOIUrl":"https://doi.org/10.1109/CITDS54976.2022.9914230","url":null,"abstract":"Nowadays, many of us wear multiple devices capable of acquiring and storing data related to our everyday activities. Since the computing power of mobile battery-operated devices slowly increases and the power optimizations allow for more and more continuous use, these devices are capable of not only monitoring our activity but analyzing the activity as well. Of these devices, the smartwatch is probably the most inconspicuous, and due to its widespread use, we have used accelerometer data gathered from a smartwatch to identify common user activities by using image generated plots and image recognition machine learning. By leveraging the.Net ML.NET machine learning framework we have managed to obtain a decent recognition rate.","PeriodicalId":271992,"journal":{"name":"2022 IEEE 2nd Conference on Information Technology and Data Science (CITDS)","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114802751","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Anomaly Detection Using Hybrid Learning for Industrial IoT 基于混合学习的工业物联网异常检测
Pub Date : 2022-05-16 DOI: 10.1109/CITDS54976.2022.9914338
Atallo Kassaw Takele, B. Villányi
The industrial internet of things (IIoT) enhances industrial and manufacturing operations by using smart sensors and actuators. However, it is hampered due to the energy efficiency requirements, real time performance requirements in a dynamic environment, and maintaining the security of applications. Security is a serious issue nowadays and is mostly caused by abnormal traffic of some nodes. For detecting those abnormalities, there are two basic machine learning approaches, namely Federated and Centralized Learning. Centralized Learning has better performance, but it has a privacy issue since edge devices send data to the server. On the other hand, Federate Learning obviates privacy issues, but it has less performance due to the resource limitation of edge devices. In this study, a typical hybrid learning based abnormality detection framework has been proposed in which edge devices undertake Federated Learning with a limited number of datasets and the edge server will use the periodically collected aggregated data from edge devices. For security reasons, edge devices share their data after a certain period of time when the time value of the data has declined. We have used Long Short Term Memory (LSTM) Autoencoders with two different datasets (a smaller for edge devices and a larger for the edge server) for the demonstration. The experimental result shows that the size of the dataset affects the predicting performance and resource utilization in an anomaly detection model.
工业物联网(IIoT)通过使用智能传感器和执行器来增强工业和制造业的运营。然而,由于能源效率要求、动态环境中的实时性能要求以及维护应用程序的安全性,它受到了阻碍。安全问题是当今网络的一个严重问题,其主要原因是某些节点的流量异常。为了检测这些异常,有两种基本的机器学习方法,即联邦学习和集中学习。集中式学习具有更好的性能,但由于边缘设备将数据发送到服务器,因此存在隐私问题。另一方面,联邦学习避免了隐私问题,但由于边缘设备的资源限制,它的性能较差。在本研究中,提出了一种典型的基于混合学习的异常检测框架,其中边缘设备使用有限数量的数据集进行联邦学习,边缘服务器将使用从边缘设备定期收集的聚合数据。出于安全考虑,边缘设备会在数据的时间值下降一段时间后共享数据。我们在演示中使用了具有两个不同数据集的长短期内存(LSTM)自动编码器(较小的数据集用于边缘设备,较大的数据集用于边缘服务器)。实验结果表明,数据集的大小影响异常检测模型的预测性能和资源利用率。
{"title":"Anomaly Detection Using Hybrid Learning for Industrial IoT","authors":"Atallo Kassaw Takele, B. Villányi","doi":"10.1109/CITDS54976.2022.9914338","DOIUrl":"https://doi.org/10.1109/CITDS54976.2022.9914338","url":null,"abstract":"The industrial internet of things (IIoT) enhances industrial and manufacturing operations by using smart sensors and actuators. However, it is hampered due to the energy efficiency requirements, real time performance requirements in a dynamic environment, and maintaining the security of applications. Security is a serious issue nowadays and is mostly caused by abnormal traffic of some nodes. For detecting those abnormalities, there are two basic machine learning approaches, namely Federated and Centralized Learning. Centralized Learning has better performance, but it has a privacy issue since edge devices send data to the server. On the other hand, Federate Learning obviates privacy issues, but it has less performance due to the resource limitation of edge devices. In this study, a typical hybrid learning based abnormality detection framework has been proposed in which edge devices undertake Federated Learning with a limited number of datasets and the edge server will use the periodically collected aggregated data from edge devices. For security reasons, edge devices share their data after a certain period of time when the time value of the data has declined. We have used Long Short Term Memory (LSTM) Autoencoders with two different datasets (a smaller for edge devices and a larger for the edge server) for the demonstration. The experimental result shows that the size of the dataset affects the predicting performance and resource utilization in an anomaly detection model.","PeriodicalId":271992,"journal":{"name":"2022 IEEE 2nd Conference on Information Technology and Data Science (CITDS)","volume":"118 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116076830","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Using a virtual reality headset in the simulation of the control room of a nuclear power plant 利用虚拟现实耳机在核电站控制室进行模拟
Pub Date : 2022-05-16 DOI: 10.1109/CITDS54976.2022.9914190
B. Szabó
Simulators for operator training have long been in use for nuclear power plants. These are traditionally full-scope simulators with an expensive physical replica of the control room. Recent advances in virtual reality headsets provide affordable means for presenting a stereoscopic view of a virtual model of the control room. While the commercially available headsets are still not perfect, they offer more realism than flat screens, showing a stereoscopic view. The paper provides some details on how a virtual reality headset has been utilized for viewing the virtual control room of the Paks Nuclear Power Plant, modeled with the Blender Game Engine, with an added autofocus feature based on a pragmatic method. Some aspects of the solution are outlined, and, partially based on the experiences gained in the project, current problems and future trends of virtual reality headsets are discussed.
用于操作员培训的模拟器长期以来一直用于核电站。这些是传统的全范围模拟器,具有昂贵的控制室物理复制品。虚拟现实耳机的最新进展为呈现控制室虚拟模型的立体视图提供了经济实惠的手段。虽然市面上的头戴式耳机还不够完美,但它们比平面屏幕提供了更多的真实感,可以显示立体视图。本文详细介绍了如何利用虚拟现实头显来查看帕克斯核电站的虚拟控制室,该虚拟控制室使用Blender游戏引擎建模,并基于实用方法添加了自动对焦功能。概述了解决方案的一些方面,并部分基于项目中获得的经验,讨论了虚拟现实头显的当前问题和未来趋势。
{"title":"Using a virtual reality headset in the simulation of the control room of a nuclear power plant","authors":"B. Szabó","doi":"10.1109/CITDS54976.2022.9914190","DOIUrl":"https://doi.org/10.1109/CITDS54976.2022.9914190","url":null,"abstract":"Simulators for operator training have long been in use for nuclear power plants. These are traditionally full-scope simulators with an expensive physical replica of the control room. Recent advances in virtual reality headsets provide affordable means for presenting a stereoscopic view of a virtual model of the control room. While the commercially available headsets are still not perfect, they offer more realism than flat screens, showing a stereoscopic view. The paper provides some details on how a virtual reality headset has been utilized for viewing the virtual control room of the Paks Nuclear Power Plant, modeled with the Blender Game Engine, with an added autofocus feature based on a pragmatic method. Some aspects of the solution are outlined, and, partially based on the experiences gained in the project, current problems and future trends of virtual reality headsets are discussed.","PeriodicalId":271992,"journal":{"name":"2022 IEEE 2nd Conference on Information Technology and Data Science (CITDS)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126379726","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Testing MPT-GRE Multipath Solution in Vehicular Network V2I Communication 车载网络V2I通信中MPT-GRE多路径方案的测试
Pub Date : 2022-05-16 DOI: 10.1109/CITDS54976.2022.9914181
S. Szilágyi, László Kovács
A vehicular network is a communication system comprising of vehicles equipped with radio-interfaces, where the endpoints are capable of exchanging data and communication between each other (Vehicle-to-Vehicle, V2V), as well as with another mobile network or fixed infrastructure (Vehicle-to-Infrastructure, V2I). The numerous applications used in vehicles typically require seamless and increasingly fast and reliable network connections, which poses a challenge for the wireless network technologies at our disposal today. MPT-GRE, developed at the University of Debrecen, is a multi-interface access technology, which could offer a novel solution to satisfy the requirements of the services used in vehicular networking applications. Given that MPT-GRE enables the simultaneous usage of multiple network interfaces and IP-routes for vehicles, it promises to be an effective solution for vehicular networks. In this paper, we are examining the efficiency of MPT-GRE using a self-driving car model in a dual-interface Wi-Fi environment.
车辆网络是由配备无线电接口的车辆组成的通信系统,其中端点能够在彼此之间(车对车,V2V)以及与另一个移动网络或固定基础设施(车对基础设施,V2I)交换数据和通信。车辆中使用的众多应用程序通常需要无缝且日益快速可靠的网络连接,这对我们今天所掌握的无线网络技术提出了挑战。德国德布勒森大学(University of Debrecen)开发的MPT-GRE是一种多接口接入技术,它可以提供一种新颖的解决方案,以满足车联网应用中使用的服务需求。考虑到MPT-GRE可以同时使用多个网络接口和ip路由,它有望成为车载网络的有效解决方案。在本文中,我们使用双接口Wi-Fi环境下的自动驾驶汽车模型来检验MPT-GRE的效率。
{"title":"Testing MPT-GRE Multipath Solution in Vehicular Network V2I Communication","authors":"S. Szilágyi, László Kovács","doi":"10.1109/CITDS54976.2022.9914181","DOIUrl":"https://doi.org/10.1109/CITDS54976.2022.9914181","url":null,"abstract":"A vehicular network is a communication system comprising of vehicles equipped with radio-interfaces, where the endpoints are capable of exchanging data and communication between each other (Vehicle-to-Vehicle, V2V), as well as with another mobile network or fixed infrastructure (Vehicle-to-Infrastructure, V2I). The numerous applications used in vehicles typically require seamless and increasingly fast and reliable network connections, which poses a challenge for the wireless network technologies at our disposal today. MPT-GRE, developed at the University of Debrecen, is a multi-interface access technology, which could offer a novel solution to satisfy the requirements of the services used in vehicular networking applications. Given that MPT-GRE enables the simultaneous usage of multiple network interfaces and IP-routes for vehicles, it promises to be an effective solution for vehicular networks. In this paper, we are examining the efficiency of MPT-GRE using a self-driving car model in a dual-interface Wi-Fi environment.","PeriodicalId":271992,"journal":{"name":"2022 IEEE 2nd Conference on Information Technology and Data Science (CITDS)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126181314","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Torch: Software Package For The Search Of Linear Binary Codes Torch:用于搜索线性二进制码的软件包
Pub Date : 2022-05-16 DOI: 10.1109/CITDS54976.2022.9914052
Carolin Hannusch, Sándor Roland Major
We describe a software package created by the authors that can be used to search for linear binary codes with almost arbitrary conditions. The package is easily extensible and reconfigurable to suit the specific needs of the search. The main function can be used to search for currently unknown linear codes, or to quickly generate examples of known codes.
我们描述了一个由作者创建的软件包,它可以用来搜索几乎任意条件下的线性二进制码。该包易于扩展和重新配置,以满足搜索的特定需求。main函数可用于搜索当前未知的线性代码,或快速生成已知代码的示例。
{"title":"Torch: Software Package For The Search Of Linear Binary Codes","authors":"Carolin Hannusch, Sándor Roland Major","doi":"10.1109/CITDS54976.2022.9914052","DOIUrl":"https://doi.org/10.1109/CITDS54976.2022.9914052","url":null,"abstract":"We describe a software package created by the authors that can be used to search for linear binary codes with almost arbitrary conditions. The package is easily extensible and reconfigurable to suit the specific needs of the search. The main function can be used to search for currently unknown linear codes, or to quickly generate examples of known codes.","PeriodicalId":271992,"journal":{"name":"2022 IEEE 2nd Conference on Information Technology and Data Science (CITDS)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126042999","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2022 IEEE 2nd Conference on Information Technology and Data Science (CITDS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1