首页 > 最新文献

2017 11th International Conference on Intelligent Systems and Control (ISCO)最新文献

英文 中文
A survey on moving object tracking using image processing 基于图像处理的运动目标跟踪研究综述
Pub Date : 1900-01-01 DOI: 10.1109/ISCO.2017.7856037
S. Balaji, R. Scholar
Image processing is a method of extracting some useful information by converting image into digital inform by performing some operations on it. Object detection and tracking are the task that is important and challenging such as video surveillance and vehicle navigation. Video surveillance is a technology which works in dynamic environment in various events such as sports, public safety, and management of traffic. This paper reviews the various challenges and aspects of detection and tracking of objects.
图像处理是通过对图像进行一定的操作,将图像转换成数字信息,从中提取有用信息的一种方法。目标检测与跟踪是视频监控、车辆导航等重要而具有挑战性的任务。视频监控是一种应用于运动、公共安全、交通管理等各种活动的动态环境中的技术。本文综述了目标检测和跟踪的各种挑战和方面。
{"title":"A survey on moving object tracking using image processing","authors":"S. Balaji, R. Scholar","doi":"10.1109/ISCO.2017.7856037","DOIUrl":"https://doi.org/10.1109/ISCO.2017.7856037","url":null,"abstract":"Image processing is a method of extracting some useful information by converting image into digital inform by performing some operations on it. Object detection and tracking are the task that is important and challenging such as video surveillance and vehicle navigation. Video surveillance is a technology which works in dynamic environment in various events such as sports, public safety, and management of traffic. This paper reviews the various challenges and aspects of detection and tracking of objects.","PeriodicalId":321113,"journal":{"name":"2017 11th International Conference on Intelligent Systems and Control (ISCO)","volume":"33 9","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120815616","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 60
CRCMD&R: Cluster and Reputation based cooperative malicious node Detection & Removal scheme in MANETs 基于集群和信誉的manet协同恶意节点检测与移除方案
Pub Date : 1900-01-01 DOI: 10.1109/ISCO.2017.7856012
Saurabh Sharma, S. Gambhir
While mobile ad hoc networks have become a mature & globally adopted technology due to its wide range of applications. Such environment has some basic differences in comparison to wired networks. Due to these little differences the MANETs are more prone to interception and manipulation. This further opens possibilities of insecure routing. For the efficient and secure delivery of data CRCMD&R (Cluster and Reputation based cooperative malicious node Detection and Removal) scheme is proposed in this paper. CRCMD&R suggests organising the MANET into a number of clusters and each node in the network has a specific prime number which acts as Node Identity. CRCMD&R uses Legitimacy value table and Reputation level table maintained by each node in the network to find and use a safe route between a source and a destination. The cornerstones of our work are the various metrics which can be further calculated by the values collected in Legitimacy value table and Reputation level table. Depending upon these metrics the cluster head nodes exclude or include the nodes from the discovered route and select the most reliable route to a specific destination.
而移动自组织网络由于其广泛的应用范围,已经成为一种成熟的、全球采用的技术。这种环境与有线网络相比有一些基本的区别。由于这些微小的差异,manet更容易被拦截和操纵。这进一步增加了不安全路由的可能性。为了实现高效、安全的数据传输,本文提出了基于集群和信誉的协同恶意节点检测与移除(CRCMD&R)方案。CRCMD&R建议将MANET组织成许多集群,网络中的每个节点都有一个特定的素数,作为节点标识。CRCMD&R使用网络中每个节点维护的合法性值表和信誉等级表来查找和使用源和目的之间的安全路由。我们工作的基础是各种指标,这些指标可以通过合法性值表和声誉等级表中收集的值进一步计算。根据这些度量,簇头节点从发现的路由中排除或包含节点,并选择到特定目的地的最可靠路由。
{"title":"CRCMD&R: Cluster and Reputation based cooperative malicious node Detection & Removal scheme in MANETs","authors":"Saurabh Sharma, S. Gambhir","doi":"10.1109/ISCO.2017.7856012","DOIUrl":"https://doi.org/10.1109/ISCO.2017.7856012","url":null,"abstract":"While mobile ad hoc networks have become a mature & globally adopted technology due to its wide range of applications. Such environment has some basic differences in comparison to wired networks. Due to these little differences the MANETs are more prone to interception and manipulation. This further opens possibilities of insecure routing. For the efficient and secure delivery of data CRCMD&R (Cluster and Reputation based cooperative malicious node Detection and Removal) scheme is proposed in this paper. CRCMD&R suggests organising the MANET into a number of clusters and each node in the network has a specific prime number which acts as Node Identity. CRCMD&R uses Legitimacy value table and Reputation level table maintained by each node in the network to find and use a safe route between a source and a destination. The cornerstones of our work are the various metrics which can be further calculated by the values collected in Legitimacy value table and Reputation level table. Depending upon these metrics the cluster head nodes exclude or include the nodes from the discovered route and select the most reliable route to a specific destination.","PeriodicalId":321113,"journal":{"name":"2017 11th International Conference on Intelligent Systems and Control (ISCO)","volume":"95 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127137870","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
REHDIS: Refined Hamming Distance technique to minimize data transfer delay in Mobile Ad-hoc Networks REHDIS:在移动自组织网络中最小化数据传输延迟的改进汉明距离技术
Pub Date : 1900-01-01 DOI: 10.1109/ISCO.2017.7856043
P. Newton, R. N. Rio
Mobile Ad-hoc Networks (MANETs) is one kind of wireless mobile network. It helps to communicate between the mobile nodes (devices) any time and in any location. MANETs can change the locations and has the ability to discover the path dynamically. In other words, topology is updated rapidly due to the dynamic nature of the nodes. There are many issues associated with MANETs such as fading, multiuser interference, frequent topology change, optimum routing, etc., that affect the efficient data transfer. This paper proactively selects best optimum path among the multiple paths. Ultimately, the outcomes of the proposed technique, REHDIS increases the speed of data transfer, reduces the End-to-End delay, produces less Packet Drop and increases Packet Delivery Ratio. REHDIS has been evaluated using Network Simulator - 2.34(NS-2.34).
移动自组网(manet)是一种无线移动网络。它有助于在任何时间、任何地点的移动节点(设备)之间进行通信。manet可以改变位置,并具有动态发现路径的能力。换句话说,由于节点的动态特性,拓扑可以快速更新。与manet相关的许多问题,如衰落、多用户干扰、频繁拓扑变化、最优路由等,都影响着数据的高效传输。本文从多个路径中主动选择最优路径。最终,该技术的结果是提高了数据传输速度,减少了端到端延迟,减少了丢包,提高了包交付率。REHDIS使用Network Simulator -2.34 (NS-2.34)进行了评估。
{"title":"REHDIS: Refined Hamming Distance technique to minimize data transfer delay in Mobile Ad-hoc Networks","authors":"P. Newton, R. N. Rio","doi":"10.1109/ISCO.2017.7856043","DOIUrl":"https://doi.org/10.1109/ISCO.2017.7856043","url":null,"abstract":"Mobile Ad-hoc Networks (MANETs) is one kind of wireless mobile network. It helps to communicate between the mobile nodes (devices) any time and in any location. MANETs can change the locations and has the ability to discover the path dynamically. In other words, topology is updated rapidly due to the dynamic nature of the nodes. There are many issues associated with MANETs such as fading, multiuser interference, frequent topology change, optimum routing, etc., that affect the efficient data transfer. This paper proactively selects best optimum path among the multiple paths. Ultimately, the outcomes of the proposed technique, REHDIS increases the speed of data transfer, reduces the End-to-End delay, produces less Packet Drop and increases Packet Delivery Ratio. REHDIS has been evaluated using Network Simulator - 2.34(NS-2.34).","PeriodicalId":321113,"journal":{"name":"2017 11th International Conference on Intelligent Systems and Control (ISCO)","volume":"93 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121753991","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A survey on multi-constrained optimal path selection schemes and authentication schemes for VANET VANET多约束最优路径选择方案及认证方案综述
Pub Date : 1900-01-01 DOI: 10.1109/ISCO.2017.7855995
V. Kanimozhi, S. Karthik
Vehicular ad hoc networks (VANETs) are intended to get better driver safety, avoid collisions, and offer traffic optimization. Recent years have behold an increasing interest in the security schemes for VANETs as well as improve multi-constrained optimal path selection for finding feasible routes. However, there are still several issues to be convey prior to such authentication mechanisms can be voluntarily and extensively used in real-life deployments. In this paper, we examine several authentication schemes and multi-constrained optimal path selection based on certain criteria like Qos constraints.
车辆自组织网络(VANETs)旨在提高驾驶员的安全性,避免碰撞,并提供交通优化。近年来,人们越来越关注vanet的安全方案以及改进多约束最优路径选择以寻找可行路径。然而,在这种身份验证机制能够自愿地在实际部署中广泛使用之前,仍然有几个问题需要传达。本文研究了几种认证方案和基于Qos约束等标准的多约束最优路径选择。
{"title":"A survey on multi-constrained optimal path selection schemes and authentication schemes for VANET","authors":"V. Kanimozhi, S. Karthik","doi":"10.1109/ISCO.2017.7855995","DOIUrl":"https://doi.org/10.1109/ISCO.2017.7855995","url":null,"abstract":"Vehicular ad hoc networks (VANETs) are intended to get better driver safety, avoid collisions, and offer traffic optimization. Recent years have behold an increasing interest in the security schemes for VANETs as well as improve multi-constrained optimal path selection for finding feasible routes. However, there are still several issues to be convey prior to such authentication mechanisms can be voluntarily and extensively used in real-life deployments. In this paper, we examine several authentication schemes and multi-constrained optimal path selection based on certain criteria like Qos constraints.","PeriodicalId":321113,"journal":{"name":"2017 11th International Conference on Intelligent Systems and Control (ISCO)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116548267","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Wide area islanding detection using Phasor Measurement Unit 使用相量测量单元的广域孤岛检测
Pub Date : 1900-01-01 DOI: 10.1109/ISCO.2017.7855652
Dhruba Kumar, P. Bhowmik
Islanding is a special type of open circuit fault where the distributed resource continues to feed local loads during loss of mains situation. This paper develops a technique to detect islanding in a six bus power system. The input to the technique is dependent on synchrophasor measurement. The decision made in the technique is based on IEC62116 standards and predefined threshold and of current phasors. Synchrophasor based islanding detection can be considered as communication based islanding detection where measurements from both islanded region and grid connected region are utilized for islanding detection. PMU based islanding detection is highly recommended to predetermine cascading line outage and to check voltage profile of islanded region.
孤岛故障是一种特殊类型的开路故障,在停电情况下,分布式资源继续为本地负荷供电。本文提出了一种六母线电力系统孤岛检测技术。该技术的输入依赖于同步相量测量。该技术的决策是基于IEC62116标准和预定义的阈值和当前相量。基于同步相量的孤岛检测可以看作是基于通信的孤岛检测,同时利用孤岛区域和并网区域的测量值进行孤岛检测。基于PMU的孤岛检测被推荐用于预先确定级联线路停运和检查孤岛区域的电压分布。
{"title":"Wide area islanding detection using Phasor Measurement Unit","authors":"Dhruba Kumar, P. Bhowmik","doi":"10.1109/ISCO.2017.7855652","DOIUrl":"https://doi.org/10.1109/ISCO.2017.7855652","url":null,"abstract":"Islanding is a special type of open circuit fault where the distributed resource continues to feed local loads during loss of mains situation. This paper develops a technique to detect islanding in a six bus power system. The input to the technique is dependent on synchrophasor measurement. The decision made in the technique is based on IEC62116 standards and predefined threshold and of current phasors. Synchrophasor based islanding detection can be considered as communication based islanding detection where measurements from both islanded region and grid connected region are utilized for islanding detection. PMU based islanding detection is highly recommended to predetermine cascading line outage and to check voltage profile of islanded region.","PeriodicalId":321113,"journal":{"name":"2017 11th International Conference on Intelligent Systems and Control (ISCO)","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130051908","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Importance of artificial neural networks for location of faults in transmission systems: A survey 人工神经网络在输电系统故障定位中的重要性综述
Pub Date : 1900-01-01 DOI: 10.1109/ISCO.2017.7856016
Avagaddi Prasad, J. Edward
This paper presents a survey on location of faults in overhead transmission lines using artificial neural networks. The demand for electricity is raising day by day, with proportional to increase of population, we need to generate more power to meet out the demand. It's a challenging task for power engineers to provide good quality of power to the consumers as per their requirement. In electrical power system maximum number of faults occurs in overhead transmission lines. Fault location is one of the major tasks in fault analysis. So the upgradation of old protective relaying systems is necessary due to the unexpected changes in electrical power systems. This survey presents the importance of artificial neural networks for fault location, because it has many advantages compared to other soft computing techniques namely fuzzy logic approach, wavelet technique, support vector machine and other conventional methods.
本文介绍了一种基于人工神经网络的架空输电线路故障定位方法。对电力的需求日益增加,与人口的增长成正比,我们需要生产更多的电力来满足需求。如何根据用户的需求为用户提供高质量的电力是电力工程师面临的一项具有挑战性的任务。在电力系统中,架空输电线路是发生故障最多的线路。故障定位是故障分析的主要任务之一。因此,由于电力系统的突发变化,对旧继电保护系统进行升级改造是必要的。本文介绍了人工神经网络在故障定位中的重要性,因为与其他软计算技术如模糊逻辑方法、小波技术、支持向量机等传统方法相比,人工神经网络具有许多优点。
{"title":"Importance of artificial neural networks for location of faults in transmission systems: A survey","authors":"Avagaddi Prasad, J. Edward","doi":"10.1109/ISCO.2017.7856016","DOIUrl":"https://doi.org/10.1109/ISCO.2017.7856016","url":null,"abstract":"This paper presents a survey on location of faults in overhead transmission lines using artificial neural networks. The demand for electricity is raising day by day, with proportional to increase of population, we need to generate more power to meet out the demand. It's a challenging task for power engineers to provide good quality of power to the consumers as per their requirement. In electrical power system maximum number of faults occurs in overhead transmission lines. Fault location is one of the major tasks in fault analysis. So the upgradation of old protective relaying systems is necessary due to the unexpected changes in electrical power systems. This survey presents the importance of artificial neural networks for fault location, because it has many advantages compared to other soft computing techniques namely fuzzy logic approach, wavelet technique, support vector machine and other conventional methods.","PeriodicalId":321113,"journal":{"name":"2017 11th International Conference on Intelligent Systems and Control (ISCO)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131124998","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
An empirical hunt for ally co-operative cloud computing utility 对盟友合作云计算效用的实证探索
Pub Date : 1900-01-01 DOI: 10.1109/ISCO.2017.7856031
Manu A R, V. K. Agrawal, K. N. B. Murthy
A secured “co-operative cloud computing utility”, is a shared set of unique and virtually interconnected system assets. These, computing services, are accessed globally using thin clients and handheld devices through standard collective GUI, anytime, at any location upon payment of specified usage charges. This multi-ally computing utility perks up the advanced facilities to the existing assets. The security and privacy controlling of this utility (data centers, and data storage) is uniformly, vested with service patrons and suppliers, both stakeholders with shared responsibility of security implementation using multilateral relationship among them. In this paper, we propose the ontology of this vicinity, which demonstrates an interrelated layered architecture for a secured co-operative galactic computing utility. This computing architecture is proposed empirically based on our understanding and survey with various industry/academic professionals. We tried to understand the challenges they faced while using the cloud system. So, we conceptually propose this ally architecture which consists of multi-layer with multi-lateral co-operative multi-factor balanced security framework with common business interests along with shared responsibility among the stakeholders. Also we try to prove empirically multilateral balanced security which in-turn increases the strong defense measures among the multi-laterally allied bunch of users.
安全的“合作云计算实用程序”是一组共享的独特的、实际上相互连接的系统资产。这些计算服务可以在任何时间、任何地点通过标准的集体GUI使用瘦客户机和手持设备进行全局访问,只需支付指定的使用费。这种多方计算实用程序为现有资产提供了先进的设施。该实用程序(数据中心和数据存储)的安全和隐私控制是统一的,由服务客户和供应商负责,这两个利益相关者使用多边关系共同承担安全实现的责任。在本文中,我们提出了这个附近的本体,它展示了一个安全的协作星系计算实用程序的相互关联的分层体系结构。这种计算架构是基于我们对各种行业/学术专业人士的理解和调查而提出的。我们试图了解他们在使用云系统时面临的挑战。因此,我们从概念上提出了一个由多层多边合作、多因素平衡的安全框架组成的盟友架构,它具有共同的商业利益和利益相关者之间的共同责任。并试图从经验上证明多边平衡安全,从而增加多边盟国用户群之间的强防御措施。
{"title":"An empirical hunt for ally co-operative cloud computing utility","authors":"Manu A R, V. K. Agrawal, K. N. B. Murthy","doi":"10.1109/ISCO.2017.7856031","DOIUrl":"https://doi.org/10.1109/ISCO.2017.7856031","url":null,"abstract":"A secured “co-operative cloud computing utility”, is a shared set of unique and virtually interconnected system assets. These, computing services, are accessed globally using thin clients and handheld devices through standard collective GUI, anytime, at any location upon payment of specified usage charges. This multi-ally computing utility perks up the advanced facilities to the existing assets. The security and privacy controlling of this utility (data centers, and data storage) is uniformly, vested with service patrons and suppliers, both stakeholders with shared responsibility of security implementation using multilateral relationship among them. In this paper, we propose the ontology of this vicinity, which demonstrates an interrelated layered architecture for a secured co-operative galactic computing utility. This computing architecture is proposed empirically based on our understanding and survey with various industry/academic professionals. We tried to understand the challenges they faced while using the cloud system. So, we conceptually propose this ally architecture which consists of multi-layer with multi-lateral co-operative multi-factor balanced security framework with common business interests along with shared responsibility among the stakeholders. Also we try to prove empirically multilateral balanced security which in-turn increases the strong defense measures among the multi-laterally allied bunch of users.","PeriodicalId":321113,"journal":{"name":"2017 11th International Conference on Intelligent Systems and Control (ISCO)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130602780","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A vehicle dynamics based algorithm for driver evaluation 基于车辆动力学的驾驶员评价算法
Pub Date : 1900-01-01 DOI: 10.1109/ISCO.2017.7856028
S. Joshi, Niko Maas, D. Schramm
Driver evaluation and performance monitoring is crucial for safety and risk assessment. This paper proposes a novel algorithm for evaluating driver performance using vehicle state data. This indirect method of evaluation has the advantage of being unobtrusive and cheap as it uses only the easily accessible real time vehicle data. The proposed algorithm can eliminate subjectivity and automate the evaluation process. The driver being evaluated is asked to maintain lane center and drive smoothly while steering input, pedal position and acceleration data is collected. Steering activity is evaluated by defining an optimal input for lane keeping and comparing driver's input. Wheel slip and cornering conditions are considered for pedal activity evaluation. Vehicle acceleration data is used for estimating passenger comfort. An instantaneous and average index of performance is generated in real time as a final evaluation metric combining the three evaluation criteria. The Algorithm was validated using a vehicle simulator and the results are discussed.
驾驶员评价和绩效监测对安全和风险评估至关重要。本文提出了一种利用车辆状态数据评价驾驶员性能的新算法。这种间接的评估方法具有不显眼和便宜的优点,因为它只使用易于访问的实时车辆数据。该算法能够消除主观性,实现评价过程的自动化。被评估的驾驶员被要求保持车道中心并平稳驾驶,同时收集转向输入、踏板位置和加速数据。通过定义车道保持的最佳输入和比较驾驶员输入来评估转向活动。在评估踏板活动时考虑了车轮滑移和转弯情况。车辆加速度数据用于估计乘客的舒适度。实时生成一个瞬时和平均的性能指标,作为结合三个评价标准的最终评价指标。最后在仿真车上对算法进行了验证,并对结果进行了讨论。
{"title":"A vehicle dynamics based algorithm for driver evaluation","authors":"S. Joshi, Niko Maas, D. Schramm","doi":"10.1109/ISCO.2017.7856028","DOIUrl":"https://doi.org/10.1109/ISCO.2017.7856028","url":null,"abstract":"Driver evaluation and performance monitoring is crucial for safety and risk assessment. This paper proposes a novel algorithm for evaluating driver performance using vehicle state data. This indirect method of evaluation has the advantage of being unobtrusive and cheap as it uses only the easily accessible real time vehicle data. The proposed algorithm can eliminate subjectivity and automate the evaluation process. The driver being evaluated is asked to maintain lane center and drive smoothly while steering input, pedal position and acceleration data is collected. Steering activity is evaluated by defining an optimal input for lane keeping and comparing driver's input. Wheel slip and cornering conditions are considered for pedal activity evaluation. Vehicle acceleration data is used for estimating passenger comfort. An instantaneous and average index of performance is generated in real time as a final evaluation metric combining the three evaluation criteria. The Algorithm was validated using a vehicle simulator and the results are discussed.","PeriodicalId":321113,"journal":{"name":"2017 11th International Conference on Intelligent Systems and Control (ISCO)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134071273","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Code review analysis of software system using machine learning techniques 使用机器学习技术对软件系统进行代码审查分析
Pub Date : 1900-01-01 DOI: 10.1109/ISCO.2017.7855962
Harsh Lal, Gaurav Pahwa
Code review is systematic examination of a software system's source code. It is intended to find mistakes overlooked in the initial development phase, improving the overall quality of software and reducing the risk of bugs among other benefits. Reviews are done in various forms such as pair programming, informal walk-through, and formal inspections. Code review has been found to accelerate and streamline the process of software development like very few other practices in software development can. In this paper we propose a machine learning approach for the code reviews in a software system. This would help in faster and a cleaner reviews of the checked in code. The proposed approach is evaluated for feasibility on an open source system eclipse. [1], [2], [3]
代码审查是对软件系统源代码的系统检查。它的目的是发现在最初的开发阶段被忽视的错误,提高软件的整体质量,减少bug的风险以及其他好处。审查以各种形式进行,例如结对编程、非正式的演练和正式的检查。人们发现代码审查可以加速和简化软件开发过程,而软件开发中的其他实践很少能做到这一点。本文提出了一种用于软件系统代码审查的机器学习方法。这将有助于更快、更清晰地审查检入的代码。在开源系统eclipse上评估了所提出的方法的可行性。[1], [2], [3]
{"title":"Code review analysis of software system using machine learning techniques","authors":"Harsh Lal, Gaurav Pahwa","doi":"10.1109/ISCO.2017.7855962","DOIUrl":"https://doi.org/10.1109/ISCO.2017.7855962","url":null,"abstract":"Code review is systematic examination of a software system's source code. It is intended to find mistakes overlooked in the initial development phase, improving the overall quality of software and reducing the risk of bugs among other benefits. Reviews are done in various forms such as pair programming, informal walk-through, and formal inspections. Code review has been found to accelerate and streamline the process of software development like very few other practices in software development can. In this paper we propose a machine learning approach for the code reviews in a software system. This would help in faster and a cleaner reviews of the checked in code. The proposed approach is evaluated for feasibility on an open source system eclipse. [1], [2], [3]","PeriodicalId":321113,"journal":{"name":"2017 11th International Conference on Intelligent Systems and Control (ISCO)","volume":"17 10","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132334789","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Intelligent refrigerator using ARTIFICIAL INTELLIGENCE 采用人工智能的智能冰箱
Pub Date : 1900-01-01 DOI: 10.1109/ISCO.2017.7856036
Shweta A.S
The task to discover useful systems (electronic home appliances) to simplify our lives, is one of the main purpose of intelligent systems. Intelligent appliances with multimedia capability have been emerging into our daily life. Thanks to the fast advance of computing technology. Smart home is one of the most prominent areas of intelligent appliances. Kitchen is one of the places where such intelligent appliances have been used. At the same time it has been a practice for all of us to use the junk foods, or too old vegetables and fruits in our daily life due to the busy scheduled life that we lead. Or some possibilities where we do not remember the vegetables/fruits we have not been eating for a long time. This in turn leads to lack of nutrition or, some hazardous infections or might disturb the imunity power in each of us. Why don't we come across an attempt to have a device to indicate what we have (food/vegetables/fruits) and how old is it. Of course it is not possible for us to determine the exact age of the vegetable, since it is to be calculated from the day it is grown, but yet we could come across one small effort to at-least have an eye on how old is the vegetable from the day it was fetched from the vendor. Existing systems used barcode or RFID scanning to keep track of the stock. The products currently available are expensive as the user has to purchase the whole refrigerator. The Intelligent Refrigerator module is designed to convert any existing refrigerator into an intelligent cost effective appliance using ARTIFICIAL INTELLIGENCE. The intelligent refrigerator is capable of sensing and monitoring its contents and counts the age of the contents. The smart refrigerator is also able to remotely notify the user about old products via SMS (Short Message Service). Additional functionality includes indication of items we have not been eating for long time. The core functionality of the intelligent refrigerator is to maintain, with minimum effort, an inventory list of food items which might want to be purchased as soon as they turn too old. As a result, the user is notified every day about the count and age of vegetables, and the unloaded vegetables.
发现有用的系统(电子家用电器)来简化我们的生活,是智能系统的主要目的之一。具有多媒体功能的智能家电已经进入我们的日常生活。多亏了快速发展的计算机技术。智能家居是智能家电最突出的领域之一。厨房是使用这种智能电器的地方之一。与此同时,由于我们忙碌的生活,我们所有人都在日常生活中使用垃圾食品,或者太老的蔬菜和水果。或者我们不记得我们很久没有吃过的蔬菜/水果。这反过来又会导致营养缺乏或一些危险的感染,或者可能会扰乱我们每个人的免疫力。为什么我们不尝试用一种装置来表明我们有什么(食物/蔬菜/水果)以及它有多长时间呢?当然,我们不可能确定蔬菜的确切年龄,因为它是从它生长的那一天开始计算的,但我们可以做一点小小的努力,至少看看蔬菜从从摊贩那里买来的那一天起有多老。现有的系统使用条形码或RFID扫描来跟踪库存。目前可用的产品价格昂贵,因为用户必须购买整个冰箱。智能冰箱模块旨在利用人工智能将任何现有的冰箱转换为具有成本效益的智能设备。智能冰箱能够感知和监控其内容物,并计算内容物的年龄。智能冰箱还可以通过短信服务远程通知用户有关旧产品的信息。额外的功能包括我们已经很长时间没有吃的食物的指示。智能冰箱的核心功能是,以最小的努力,维护一个食品的库存清单,这些食品可能会在它们太老的时候就被购买。因此,用户每天都会收到关于蔬菜数量和年龄以及未卸载蔬菜的通知。
{"title":"Intelligent refrigerator using ARTIFICIAL INTELLIGENCE","authors":"Shweta A.S","doi":"10.1109/ISCO.2017.7856036","DOIUrl":"https://doi.org/10.1109/ISCO.2017.7856036","url":null,"abstract":"The task to discover useful systems (electronic home appliances) to simplify our lives, is one of the main purpose of intelligent systems. Intelligent appliances with multimedia capability have been emerging into our daily life. Thanks to the fast advance of computing technology. Smart home is one of the most prominent areas of intelligent appliances. Kitchen is one of the places where such intelligent appliances have been used. At the same time it has been a practice for all of us to use the junk foods, or too old vegetables and fruits in our daily life due to the busy scheduled life that we lead. Or some possibilities where we do not remember the vegetables/fruits we have not been eating for a long time. This in turn leads to lack of nutrition or, some hazardous infections or might disturb the imunity power in each of us. Why don't we come across an attempt to have a device to indicate what we have (food/vegetables/fruits) and how old is it. Of course it is not possible for us to determine the exact age of the vegetable, since it is to be calculated from the day it is grown, but yet we could come across one small effort to at-least have an eye on how old is the vegetable from the day it was fetched from the vendor. Existing systems used barcode or RFID scanning to keep track of the stock. The products currently available are expensive as the user has to purchase the whole refrigerator. The Intelligent Refrigerator module is designed to convert any existing refrigerator into an intelligent cost effective appliance using ARTIFICIAL INTELLIGENCE. The intelligent refrigerator is capable of sensing and monitoring its contents and counts the age of the contents. The smart refrigerator is also able to remotely notify the user about old products via SMS (Short Message Service). Additional functionality includes indication of items we have not been eating for long time. The core functionality of the intelligent refrigerator is to maintain, with minimum effort, an inventory list of food items which might want to be purchased as soon as they turn too old. As a result, the user is notified every day about the count and age of vegetables, and the unloaded vegetables.","PeriodicalId":321113,"journal":{"name":"2017 11th International Conference on Intelligent Systems and Control (ISCO)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127856577","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
期刊
2017 11th International Conference on Intelligent Systems and Control (ISCO)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1