首页 > 最新文献

EAI Endorsed Transactions on Industrial Networks and Intelligent Systems最新文献

英文 中文
Performance Analysis of Deep Neural Networks Using Computer Vision 基于计算机视觉的深度神经网络性能分析
Q2 Engineering Pub Date : 2021-10-13 DOI: 10.4108/eai.13-10-2021.171318
Nidhi Sindhwani, Rohit Anand, M. S, Rati Shukla, Mahendra Pratap Yadav, Vikash Yadav
INTRODUCTION: In recent years, deep learning techniques have been made to outperform the earlier state-of-the-art machine learning techniques in many areas, with one of the most notable cases being computer vision. Deep learning is also employed to train the neural networks with the images and to perform the various tasks such as classification and segmentation using several different models. The size and depth of current deep learning models have increased to solve certain tasks as these models provide better accuracy. As pre-trained weights may be used for further training and prevent costly computing, transfer learning is therefore of vital importance. A brief account is given of their history, structure, benefits, and drawbacks, followed by a description of their applications in the different tasks of computer vision, such as object detection, face recognition etc. OBJECTIVE:. The purpose of this paper is to train a deep neural network to properly classify the images that it has never seen before, define techniques to enhance the efficiency of deep learning and deploy deep neural networks in various applications. METHOD: The proposed approach represents that after the reading of images, 256x256 pixel image’s random parts are extracted and noise, distortion, flip, or rotation transforms are applied. Multiple convolution and pooling steps are applied by controlling the stride lengths. RESULT: Data analysis and research findings showed that DNN models have been implemented in three main configurations of deep learning: CNTK, MXNet and TensorFlow. The proposed work outperforms the previous techniques in predicting the dependent variables, learning rate, image count, image mean, performance analysis of loss rate and learning rate during training, performance Analysis of Loss with respect to Epoch for Training, Validation and Accuracy. CONCLUSION: This research encompasses a large variety of computer applications, from image recognition and machine translation to enhanced learning. DNN models have been implemented in three main configurations of deep learning: CNTK, MXNet and TensorFlow. Extensive research has been conducted using the various deep architectures such as AlexNet, InceptionNet, etc. To the best of authors’ knowledge, this is the first work that presents a quantitative analysis of the deep architectures mentioned above.
近年来,深度学习技术已经在许多领域超越了早期最先进的机器学习技术,其中最著名的案例之一是计算机视觉。深度学习也被用于训练神经网络与图像,并执行各种任务,如分类和分割使用几个不同的模型。当前深度学习模型的规模和深度已经增加,以解决某些任务,因为这些模型提供了更好的准确性。由于预训练的权重可以用于进一步的训练,并且可以避免昂贵的计算,因此迁移学习至关重要。简要介绍了它们的历史、结构、优点和缺点,然后描述了它们在计算机视觉的不同任务中的应用,如物体检测、人脸识别等。目的:。本文的目的是训练深度神经网络对从未见过的图像进行正确分类,定义提高深度学习效率的技术,并将深度神经网络部署在各种应用中。方法:该方法是在读取图像后,提取256x256像素图像的随机部分,并对其进行噪声、失真、翻转或旋转变换。通过控制步长,应用了多个卷积和池化步骤。结果:数据分析和研究结果表明,DNN模型已经在三种主要的深度学习配置中实现:CNTK、MXNet和TensorFlow。所提出的工作在预测因变量、学习率、图像计数、图像均值、训练期间损失率和学习率的性能分析、loss相对于Epoch for training、Validation和Accuracy的性能分析方面优于先前的技术。结论:这项研究涵盖了大量的计算机应用,从图像识别和机器翻译到增强学习。DNN模型已经在深度学习的三种主要配置中实现:CNTK, MXNet和TensorFlow。使用各种深度架构(如AlexNet, InceptionNet等)进行了广泛的研究。据作者所知,这是第一本对上述深度架构进行定量分析的著作。
{"title":"Performance Analysis of Deep Neural Networks Using Computer Vision","authors":"Nidhi Sindhwani, Rohit Anand, M. S, Rati Shukla, Mahendra Pratap Yadav, Vikash Yadav","doi":"10.4108/eai.13-10-2021.171318","DOIUrl":"https://doi.org/10.4108/eai.13-10-2021.171318","url":null,"abstract":"INTRODUCTION: In recent years, deep learning techniques have been made to outperform the earlier state-of-the-art machine learning techniques in many areas, with one of the most notable cases being computer vision. Deep learning is also employed to train the neural networks with the images and to perform the various tasks such as classification and segmentation using several different models. The size and depth of current deep learning models have increased to solve certain tasks as these models provide better accuracy. As pre-trained weights may be used for further training and prevent costly computing, transfer learning is therefore of vital importance. A brief account is given of their history, structure, benefits, and drawbacks, followed by a description of their applications in the different tasks of computer vision, such as object detection, face recognition etc. OBJECTIVE:. The purpose of this paper is to train a deep neural network to properly classify the images that it has never seen before, define techniques to enhance the efficiency of deep learning and deploy deep neural networks in various applications. METHOD: The proposed approach represents that after the reading of images, 256x256 pixel image’s random parts are extracted and noise, distortion, flip, or rotation transforms are applied. Multiple convolution and pooling steps are applied by controlling the stride lengths. RESULT: Data analysis and research findings showed that DNN models have been implemented in three main configurations of deep learning: CNTK, MXNet and TensorFlow. The proposed work outperforms the previous techniques in predicting the dependent variables, learning rate, image count, image mean, performance analysis of loss rate and learning rate during training, performance Analysis of Loss with respect to Epoch for Training, Validation and Accuracy. CONCLUSION: This research encompasses a large variety of computer applications, from image recognition and machine translation to enhanced learning. DNN models have been implemented in three main configurations of deep learning: CNTK, MXNet and TensorFlow. Extensive research has been conducted using the various deep architectures such as AlexNet, InceptionNet, etc. To the best of authors’ knowledge, this is the first work that presents a quantitative analysis of the deep architectures mentioned above.","PeriodicalId":33474,"journal":{"name":"EAI Endorsed Transactions on Industrial Networks and Intelligent Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79677777","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Classification of UNSW-NB15 dataset using Exploratory Data Analysis using Ensemble Learning 基于集成学习的探索性数据分析的UNSW-NB15数据集分类
Q2 Engineering Pub Date : 2021-10-13 DOI: 10.4108/eai.13-10-2021.171319
N. Sharma, N. Yadav, Saurabh Sharma
Recent advancements in machine learning have made it a tool of choice for different classification and analytical problems. This paper deals with a critical field of computer networking: network security and the possibilities of machine learning automation in this field. We will be doing exploratory data analysis on the benchmark UNSW-NB15 dataset. This dataset is a modern substitute for the outdated KDD’99 dataset as it has greater uniformity of pattern distribution. We will also implement several ensemble algorithms like Random Forest, Extra trees, AdaBoost, and XGBoost to derive insights from the data and make useful predictions. We calculated all the standard evaluation parameters for comparative analysis among all the classifiers used. This analysis gives knowledge, investigates difficulties, and future opportunities to propel machine learning in networking. This paper can give a basic understanding of data analytics in terms of security using Machine Learning techniques.
机器学习的最新进展使其成为解决不同分类和分析问题的首选工具。本文讨论了计算机网络的一个关键领域:网络安全和机器学习自动化在该领域的可能性。我们将对基准UNSW-NB15数据集进行探索性数据分析。该数据集是过时的KDD ' 99数据集的现代替代品,因为它具有更大的模式分布均匀性。我们还将实现几个集成算法,如Random Forest, Extra trees, AdaBoost和XGBoost,以从数据中获得见解并做出有用的预测。我们计算了所有标准评价参数,以便在所使用的所有分类器之间进行比较分析。这种分析提供了知识,调查了困难,以及未来的机会,以推动网络中的机器学习。本文可以从安全性的角度对使用机器学习技术的数据分析进行基本的了解。
{"title":"Classification of UNSW-NB15 dataset using Exploratory Data Analysis using Ensemble Learning","authors":"N. Sharma, N. Yadav, Saurabh Sharma","doi":"10.4108/eai.13-10-2021.171319","DOIUrl":"https://doi.org/10.4108/eai.13-10-2021.171319","url":null,"abstract":"Recent advancements in machine learning have made it a tool of choice for different classification and analytical problems. This paper deals with a critical field of computer networking: network security and the possibilities of machine learning automation in this field. We will be doing exploratory data analysis on the benchmark UNSW-NB15 dataset. This dataset is a modern substitute for the outdated KDD’99 dataset as it has greater uniformity of pattern distribution. We will also implement several ensemble algorithms like Random Forest, Extra trees, AdaBoost, and XGBoost to derive insights from the data and make useful predictions. We calculated all the standard evaluation parameters for comparative analysis among all the classifiers used. This analysis gives knowledge, investigates difficulties, and future opportunities to propel machine learning in networking. This paper can give a basic understanding of data analytics in terms of security using Machine Learning techniques.","PeriodicalId":33474,"journal":{"name":"EAI Endorsed Transactions on Industrial Networks and Intelligent Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86459674","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Reliability-Security Analysis for Harvest-to-Jam based Multi-hop Cluster MIMO Networks Using Cooperative Jamming Methods Under Impact of Hardware Impairments 硬件损伤影响下协同干扰多跳集群MIMO网络可靠性安全分析
Q2 Engineering Pub Date : 2021-09-17 DOI: 10.4108/eai.17-9-2021.170963
Ngo The Anh, C. M. Nguyen, Tran Trung Duy, Tan Hanh, Hoang Dang Hai
In this paper, we consider harvest-to-jam based secure multi-hop cluster multi-input multi-output networks, where a multi-antenna source sends its data to a multi-antenna destination via multi-antenna intermediate cluster heads. The data transmission at each hop is realized by using transmit antenna selection and selection combining techniques, and is overheard by a multi-antenna eavesdropper using selection combining. In addition, joint antenna and jammer selection methods are performed at each hop to reduce quality of the eavesdropping channels. The cluster members can harvest wireless energy from the previous cluster head, and use the harvested energy for emitting jamming noises on the eavesdropper. We propose three cooperative jamming algorithms, named best antenna and best jammer selection (BA-BJ), random antenna and all jammer selection (RA-AJ) and all antenna and all jammer selection (AA-AJ). Then, end-to-end outage probability and intercept probability of the proposed algorithms are evaluated via both simulation and analysis, under impact of hardware impairments, over Rayleigh fading channel.
在本文中,我们考虑基于收获-阻塞的安全多跳集群多输入多输出网络,其中多天线源通过多天线中间簇头将其数据发送到多天线目的地。每一跳的数据传输采用发射天线选择和选择组合技术实现,并由多天线窃听器采用选择组合技术窃听。此外,在每一跳执行联合天线和干扰器选择方法,以降低窃听信道的质量。所述集群成员可以从所述前一簇头获取无线能量,并利用所述收集的能量对所述窃听者发射干扰噪声。提出了三种协同干扰算法:最佳天线和最佳干扰器选择(BA-BJ)、随机天线和全干扰器选择(RA-AJ)和全天线和全干扰器选择(AA-AJ)。然后,通过仿真和分析,在瑞利衰落信道中,在硬件损伤的影响下,评估了所提算法的端到端中断概率和截获概率。
{"title":"Reliability-Security Analysis for Harvest-to-Jam based Multi-hop Cluster MIMO Networks Using Cooperative Jamming Methods Under Impact of Hardware Impairments","authors":"Ngo The Anh, C. M. Nguyen, Tran Trung Duy, Tan Hanh, Hoang Dang Hai","doi":"10.4108/eai.17-9-2021.170963","DOIUrl":"https://doi.org/10.4108/eai.17-9-2021.170963","url":null,"abstract":"In this paper, we consider harvest-to-jam based secure multi-hop cluster multi-input multi-output networks, where a multi-antenna source sends its data to a multi-antenna destination via multi-antenna intermediate cluster heads. The data transmission at each hop is realized by using transmit antenna selection and selection combining techniques, and is overheard by a multi-antenna eavesdropper using selection combining. In addition, joint antenna and jammer selection methods are performed at each hop to reduce quality of the eavesdropping channels. The cluster members can harvest wireless energy from the previous cluster head, and use the harvested energy for emitting jamming noises on the eavesdropper. We propose three cooperative jamming algorithms, named best antenna and best jammer selection (BA-BJ), random antenna and all jammer selection (RA-AJ) and all antenna and all jammer selection (AA-AJ). Then, end-to-end outage probability and intercept probability of the proposed algorithms are evaluated via both simulation and analysis, under impact of hardware impairments, over Rayleigh fading channel.","PeriodicalId":33474,"journal":{"name":"EAI Endorsed Transactions on Industrial Networks and Intelligent Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-09-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88061779","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Review of Optimization in Improving Extreme Learning Machine 改进极限学习机的优化研究综述
Q2 Engineering Pub Date : 2021-09-17 DOI: 10.4108/eai.17-9-2021.170960
Nilesh Rathod, S. Wankhade
Now a days Extreme Learning Machine has gained a lot of interest because of its noteworthy qualities over single hiddenlayer feedforward neural networks and the kernel functions. Even if ELM has many advantages, it has some potential shortcomings such as performance sensitivity to the underlying state of the hidden neurons, input weights and the choice of functions of activation. To overcome the limitations of traditional ELM, analysts have devised numerical methods to optimise specific parts of ELM in order to enhance ELM performance for a variety of complicated difficulties and applications. Hence through this study, we intend to study the different algorithms developed for optimizing the ELM to enhance its performance in the aspects of survey criteria such as datasets, algorithm, objectives, training time, accuracy, error rate and the hidden neurons. This study will help other researchers to find out the research issues that lowering the performance of the ELM.
如今,极限学习机因其优于单隐藏层前馈神经网络和核函数的显著特性而获得了很多关注。即使ELM有许多优点,它也有一些潜在的缺点,如对隐藏神经元的底层状态的性能敏感性,输入权值和激活函数的选择。为了克服传统ELM的局限性,分析人员设计了数值方法来优化ELM的特定部分,以提高ELM在各种复杂困难和应用中的性能。因此,通过本研究,我们打算研究用于优化ELM的不同算法,以提高其在数据集、算法、目标、训练时间、准确率、错误率和隐藏神经元等调查标准方面的性能。本研究将有助于其他研究者发现降低ELM性能的研究问题。
{"title":"Review of Optimization in Improving Extreme Learning Machine","authors":"Nilesh Rathod, S. Wankhade","doi":"10.4108/eai.17-9-2021.170960","DOIUrl":"https://doi.org/10.4108/eai.17-9-2021.170960","url":null,"abstract":"Now a days Extreme Learning Machine has gained a lot of interest because of its noteworthy qualities over single hiddenlayer feedforward neural networks and the kernel functions. Even if ELM has many advantages, it has some potential shortcomings such as performance sensitivity to the underlying state of the hidden neurons, input weights and the choice of functions of activation. To overcome the limitations of traditional ELM, analysts have devised numerical methods to optimise specific parts of ELM in order to enhance ELM performance for a variety of complicated difficulties and applications. Hence through this study, we intend to study the different algorithms developed for optimizing the ELM to enhance its performance in the aspects of survey criteria such as datasets, algorithm, objectives, training time, accuracy, error rate and the hidden neurons. This study will help other researchers to find out the research issues that lowering the performance of the ELM.","PeriodicalId":33474,"journal":{"name":"EAI Endorsed Transactions on Industrial Networks and Intelligent Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-09-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89561862","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A compact 1×3 two-mode selective silicon photonic router/switch using two tunable phase shifters 一个紧凑的1×3双模选择性硅光子路由器/开关使用两个可调谐移相器
Q2 Engineering Pub Date : 2021-09-17 DOI: 10.4108/eai.17-9-2021.170962
Duong Quang Duy, Truong Cao Dung, D. Bac, Nguyen Binh, N. Hung, Chien Tang-Tan, Le Thi Phuong Mai, Nguyen Vy Rin, Phan Vu Thi Van
In this work, we propose a design in the proof-of-concept of a 1×3 two-mode selective silicon-photonics router/switch. The proposed device composes of a Y-junction coupler, two multimode interference (MMI) couplers, and two phase-shifters on the silicon-on-insulator (SOI) rib waveguides. The input modes of TE0 and TE1 can be arbitrarily and simultaneously routed to the yearning output ports by setting appropriate values (ON/OFF) for two tunable phase shifters (PSs). The structural optimization and efficient characterization processes are carried out by numerical simulation via three-dimensional beam propagation method. The proposed device exhibits the operation ability over the C-band with good optical performances in terms of insertion loss smaller than 1 dB, crosstalk under -19 dB, and relatively large geometry tolerances. Moreover, the proposed device can integrate into a footprint as compact as 5 μm × 475 μm. Such significant advantages are beneficial and promising potentials for very large-scale photonic integrated circuits, high-speed optical interconnects, and short-haul few-mode fiber communication systems. Received on 30 July 2021; accepted on 13 September 2021; published on 17 September 2021
在这项工作中,我们提出了一种1×3双模选择性硅光子路由器/开关的概念验证设计。该器件由一个y结耦合器、两个多模干涉耦合器和两个位于绝缘体上硅(SOI)肋波导上的移相器组成。通过为两个可调移相器(ps)设置适当的值(ON/OFF), TE0和TE1的输入模式可以任意地同时路由到向往输出端口。通过三维光束传播方法进行了结构优化和高效表征。该器件在c波段具有良好的光学性能,插入损耗小于1 dB,串扰小于-19 dB,几何公差较大。此外,该器件可以集成到5 μm × 475 μm的紧凑尺寸中。这些显著的优势对大规模光子集成电路、高速光互连和短距离少模光纤通信系统都是有益的和有潜力的。2021年7月30日收到;2021年9月13日接受;于2021年9月17日发布
{"title":"A compact 1×3 two-mode selective silicon photonic router/switch using two tunable phase shifters","authors":"Duong Quang Duy, Truong Cao Dung, D. Bac, Nguyen Binh, N. Hung, Chien Tang-Tan, Le Thi Phuong Mai, Nguyen Vy Rin, Phan Vu Thi Van","doi":"10.4108/eai.17-9-2021.170962","DOIUrl":"https://doi.org/10.4108/eai.17-9-2021.170962","url":null,"abstract":"In this work, we propose a design in the proof-of-concept of a 1×3 two-mode selective silicon-photonics router/switch. The proposed device composes of a Y-junction coupler, two multimode interference (MMI) couplers, and two phase-shifters on the silicon-on-insulator (SOI) rib waveguides. The input modes of TE0 and TE1 can be arbitrarily and simultaneously routed to the yearning output ports by setting appropriate values (ON/OFF) for two tunable phase shifters (PSs). The structural optimization and efficient characterization processes are carried out by numerical simulation via three-dimensional beam propagation method. The proposed device exhibits the operation ability over the C-band with good optical performances in terms of insertion loss smaller than 1 dB, crosstalk under -19 dB, and relatively large geometry tolerances. Moreover, the proposed device can integrate into a footprint as compact as 5 μm × 475 μm. Such significant advantages are beneficial and promising potentials for very large-scale photonic integrated circuits, high-speed optical interconnects, and short-haul few-mode fiber communication systems. Received on 30 July 2021; accepted on 13 September 2021; published on 17 September 2021","PeriodicalId":33474,"journal":{"name":"EAI Endorsed Transactions on Industrial Networks and Intelligent Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-09-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79197494","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Deep Neural Network-Based Approach for Extracting Textual Images from Deteriorate Images 基于深度神经网络的劣化图像文本提取方法
Q2 Engineering Pub Date : 2021-09-17 DOI: 10.4108/eai.17-9-2021.170961
B. Pandey, D. Pandey, Subodh Wariya, Gaurav Agarwal
INTRODUCTION: The quantity of audio and visual data is increasing exponentially due to the internet's rapid growth. The digital information in images and videos could be used for fully automated captions, indexing, and image structuring. The online image and video data system has seen a significant increase. In such a dataset, images and videos must be retrieved, explored, as well as inspected. OBJECTIVES: Text extraction is crucial for locating critical as well as important data. Disturbance is indeed a critical factor that affects image quality, and this is primarily generated during image acquisition and communication operations. An image can be contaminated by a variety of noise-type disturbances. A text in the complex image includes a variety of information which is used to recognise textual as well as non-textual particulars. The particulars in the complicated corrupted images have been considered important for individuals seeing the entire issue. However, text in complicated degraded images exhibits a rapidly changing form in an unconstrained circumstance, making textual data recognition complicated METHODS: The naïve bayes algorithm is a weighted reading technique is used to generate the correct text data from the complicated image regions. Usually, images hold some disturbance as a result of the fact that filtration is proposed during the early pre-processing step. To restore the image's quality, the input image is processed employing gradient and contrast image methods. Following that, the contrast of the source images would be enhanced using an adaptive image map. Stroke width transform, Gabor transform, and weighted naïve bayes classifier methodologies have been used in complicated degraded images to segment, features extraction, and detect textual and non-textual elements. RESULTS: Finally, to identify categorised textual data, the confluence of deep neural networks and particle swarm optimization is being used. The dataset IIIT5K is used for the development portion, and also the performance of the suggested methodology is assessed by utilizing parameters like as accuracy, recall, precision, and F1 score. It performs well enough for record collections such as articles, even when significantly distorted, and is thus suitable for creating library information system databases CONCLUSION: A combination of deep neural network and particle swarm optimization is being used to recognise classified text. The dataset IIIT5K is used for the development portion, and while high performance is achieved with parameters such as accuracy, recall, precision, and F1 score, characters may occasionally deviate. Alternatively, the same character is frequently extracted [3] multiple times, which may result in incorrect textual data being extracted from natural images. As a result, an efficient technique for avoiding such flaws in the text retrieval process must be implemented in the near future.
导读:由于互联网的快速发展,视听数据的数量呈指数级增长。图像和视频中的数字信息可用于全自动字幕、索引和图像结构。网络图像视频数据系统显著发展。在这样的数据集中,必须检索、探索和检查图像和视频。目的:文本提取对于定位关键数据和重要数据至关重要。干扰确实是影响图像质量的关键因素,这主要是在图像采集和通信操作过程中产生的。图像可能受到各种噪声类型干扰的污染。复杂图像中的文本包括用于识别文本和非文本细节的各种信息。在复杂的损坏图像中的细节被认为是重要的个人看到整个问题。然而,复杂退化图像中的文本在不受约束的情况下呈现出快速变化的形式,使得文本数据识别变得复杂。方法:利用naïve贝叶斯算法作为一种加权阅读技术,从复杂的图像区域中生成正确的文本数据。通常,由于在预处理的早期阶段进行了滤波,图像会受到一定的干扰。为了恢复图像的质量,对输入图像进行了梯度和对比度处理。然后,使用自适应图像映射增强源图像的对比度。笔画宽度变换、Gabor变换和加权naïve贝叶斯分类器方法被用于复杂退化图像的分割、特征提取以及文本和非文本元素的检测。结果:最后,为了识别分类文本数据,使用了深度神经网络和粒子群优化的融合。数据集IIIT5K用于开发部分,并且通过使用诸如准确性、召回率、精度和F1分数等参数来评估所建议方法的性能。即使在严重扭曲的情况下,它也能很好地处理文章等记录集合,因此适合创建图书馆信息系统数据库。结论:深度神经网络和粒子群优化的结合被用于识别分类文本。数据集IIIT5K用于开发部分,虽然通过准确性、召回率、精度和F1分数等参数实现了高性能,但字符可能偶尔会偏离。或者,同一字符经常被多次提取[3],这可能会导致从自然图像中提取错误的文本数据。因此,在不久的将来,必须实现一种有效的技术来避免文本检索过程中的这些缺陷。
{"title":"A Deep Neural Network-Based Approach for Extracting Textual Images from Deteriorate Images","authors":"B. Pandey, D. Pandey, Subodh Wariya, Gaurav Agarwal","doi":"10.4108/eai.17-9-2021.170961","DOIUrl":"https://doi.org/10.4108/eai.17-9-2021.170961","url":null,"abstract":"INTRODUCTION: The quantity of audio and visual data is increasing exponentially due to the internet's rapid growth. The digital information in images and videos could be used for fully automated captions, indexing, and image structuring. The online image and video data system has seen a significant increase. In such a dataset, images and videos must be retrieved, explored, as well as inspected. OBJECTIVES: Text extraction is crucial for locating critical as well as important data. Disturbance is indeed a critical factor that affects image quality, and this is primarily generated during image acquisition and communication operations. An image can be contaminated by a variety of noise-type disturbances. A text in the complex image includes a variety of information which is used to recognise textual as well as non-textual particulars. The particulars in the complicated corrupted images have been considered important for individuals seeing the entire issue. However, text in complicated degraded images exhibits a rapidly changing form in an unconstrained circumstance, making textual data recognition complicated METHODS: The naïve bayes algorithm is a weighted reading technique is used to generate the correct text data from the complicated image regions. Usually, images hold some disturbance as a result of the fact that filtration is proposed during the early pre-processing step. To restore the image's quality, the input image is processed employing gradient and contrast image methods. Following that, the contrast of the source images would be enhanced using an adaptive image map. Stroke width transform, Gabor transform, and weighted naïve bayes classifier methodologies have been used in complicated degraded images to segment, features extraction, and detect textual and non-textual elements. RESULTS: Finally, to identify categorised textual data, the confluence of deep neural networks and particle swarm optimization is being used. The dataset IIIT5K is used for the development portion, and also the performance of the suggested methodology is assessed by utilizing parameters like as accuracy, recall, precision, and F1 score. It performs well enough for record collections such as articles, even when significantly distorted, and is thus suitable for creating library information system databases CONCLUSION: A combination of deep neural network and particle swarm optimization is being used to recognise classified text. The dataset IIIT5K is used for the development portion, and while high performance is achieved with parameters such as accuracy, recall, precision, and F1 score, characters may occasionally deviate. Alternatively, the same character is frequently extracted [3] multiple times, which may result in incorrect textual data being extracted from natural images. As a result, an efficient technique for avoiding such flaws in the text retrieval process must be implemented in the near future.","PeriodicalId":33474,"journal":{"name":"EAI Endorsed Transactions on Industrial Networks and Intelligent Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-09-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87326375","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Deep Reinforcement Learning for Intelligent Reflecting Surface-assisted D2D Communications 智能反射表面辅助D2D通信的深度强化学习
Q2 Engineering Pub Date : 2021-08-06 DOI: 10.4108/eetinis.v10i1.2864
K. Nguyen, Antonino Masaracchia, Cheng Yin, L. Nguyen, O. Dobre, T. Duong
In this paper, we propose a deep reinforcement learning (DRL) approach for solving the optimisation problem of the network’s sum-rate in device-to-device (D2D) communications supported by an intelligent reflecting surface (IRS). The IRS is deployed to mitigate the interference and enhance the signal between the D2D transmitter and the associated D2D receiver. Our objective is to jointly optimise the transmit power at the D2D transmitter and the phase shift matrix at the IRS to maximise the network sum-rate. We formulate a Markov decision process and then propose the proximal policy optimisation for solving the maximisation game. Simulation results show impressive performance in terms of the achievable rate and processing time.
在本文中,我们提出了一种深度强化学习(DRL)方法来解决由智能反射面(IRS)支持的设备对设备(D2D)通信中网络求和速率的优化问题。部署IRS是为了减轻D2D发射器和相关D2D接收器之间的干扰并增强信号。我们的目标是共同优化D2D发射机的发射功率和IRS的相移矩阵,以最大限度地提高网络和速率。我们建立了一个马尔可夫决策过程,并在此基础上提出了求解最大化博弈的近端策略优化。仿真结果表明,该方法在可实现速率和处理时间方面具有令人印象深刻的性能。
{"title":"Deep Reinforcement Learning for Intelligent Reflecting Surface-assisted D2D Communications","authors":"K. Nguyen, Antonino Masaracchia, Cheng Yin, L. Nguyen, O. Dobre, T. Duong","doi":"10.4108/eetinis.v10i1.2864","DOIUrl":"https://doi.org/10.4108/eetinis.v10i1.2864","url":null,"abstract":"In this paper, we propose a deep reinforcement learning (DRL) approach for solving the optimisation problem of the network’s sum-rate in device-to-device (D2D) communications supported by an intelligent reflecting surface (IRS). The IRS is deployed to mitigate the interference and enhance the signal between the D2D transmitter and the associated D2D receiver. Our objective is to jointly optimise the transmit power at the D2D transmitter and the phase shift matrix at the IRS to maximise the network sum-rate. We formulate a Markov decision process and then propose the proximal policy optimisation for solving the maximisation game. Simulation results show impressive performance in terms of the achievable rate and processing time.","PeriodicalId":33474,"journal":{"name":"EAI Endorsed Transactions on Industrial Networks and Intelligent Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-08-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84160393","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Application of Artificial Intelligence for the Optimization of Hydropower Energy Generation 人工智能在水电发电优化中的应用
Q2 Engineering Pub Date : 2021-08-06 DOI: 10.4108/EAI.6-8-2021.170560
Krishna Kumar, R. Saini
Hydropower is one of the most promising sources of renewable energy. However, a substantial initial investment requires for the construction of large civil structures. Feasibility study, detailed project report preparation, construction planning, and timely execution of work are the important activities of a hydropower plant. Energy generation in hydropower plants are mainly depends on discharge and head. Therefore, an accurate estimation of discharge and head is important to decide the plant capacity. Erosion, cavitation, and operation & maintenance are the key challenges in hydropower energy generation. Artificial Intelligence (AI) has become popular, which can be utilized for site selection, parameters assessment, and operation & maintenance optimization. In this paper, a literature review on applications of AI in hydropower has been presented, and an attempt has also been made to identify the future potential areas of hydropower plants.
水电是最有前途的可再生能源之一。但是,建造大型土木结构需要大量的初期投资。可行性研究、详细项目报告的编制、建设规划和及时实施工作是水电站的重要活动。水电站的发电主要取决于流量和水头。因此,准确估计流量和水头对确定电厂容量具有重要意义。侵蚀、气蚀和运行维护是水电发电面临的主要挑战。人工智能(AI)已经开始普及,可以用于选址,参数评估和运维优化。本文对人工智能在水电中的应用进行了文献综述,并试图确定水电站未来的潜在领域。
{"title":"Application of Artificial Intelligence for the Optimization of Hydropower Energy Generation","authors":"Krishna Kumar, R. Saini","doi":"10.4108/EAI.6-8-2021.170560","DOIUrl":"https://doi.org/10.4108/EAI.6-8-2021.170560","url":null,"abstract":"Hydropower is one of the most promising sources of renewable energy. However, a substantial initial investment requires for the construction of large civil structures. Feasibility study, detailed project report preparation, construction planning, and timely execution of work are the important activities of a hydropower plant. Energy generation in hydropower plants are mainly depends on discharge and head. Therefore, an accurate estimation of discharge and head is important to decide the plant capacity. Erosion, cavitation, and operation & maintenance are the key challenges in hydropower energy generation. Artificial Intelligence (AI) has become popular, which can be utilized for site selection, parameters assessment, and operation & maintenance optimization. In this paper, a literature review on applications of AI in hydropower has been presented, and an attempt has also been made to identify the future potential areas of hydropower plants.","PeriodicalId":33474,"journal":{"name":"EAI Endorsed Transactions on Industrial Networks and Intelligent Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-08-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76264309","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Formation Control Algorithms for Multiple-UAVs: A Comprehensive Survey 多无人机编队控制算法综述
Q2 Engineering Pub Date : 2021-06-23 DOI: 10.4108/eai.10-6-2021.170230
Hai T. Do, Hoang T. Hua, M. Nguyen, Cuong V. Nguyen, H. T. Nguyen, Hoa T. Nguyen, N. T. Nguyen
Unmanned aerial vehicles (UAVs) have been widely deployed in many applications such as transportation, data collection, monitoring, or tracking objects. Nowadays, numerous missions require UAVs to operate in a large area or to complete missions in a stringent period of time. Using a single UAV may not meet the performance requirements because of its small size and limited battery. In this situation, multiple Unmanned Aerial Vehicles (UAVs) have emerged as an e ff ective measure that can address these limitations. A group of UAVs cooperatively working together could o ff er a solution that is more e ffi cient and economical than using a powerful UAV alone. To better utilizing the multiple-UAVs system, control of formation UAVs is a critical challenge that needs to overcome. Therefore, formation control has become an active research topic that gains great attention from researchers. Extensive research e ff orts have been dedicated to studying the formation control problem with numerous control protocols which have been proposed. This paper reviews the profound studies on formation control in literature. Each approach is investigated based on di ff erent criteria, which highlights its distinct merits and demerits. The comparison is provided to facilitate the readers in their future researches in the field of formation control. Finally, some open challenges and research directions are also discussed.
无人驾驶飞行器(uav)已广泛应用于运输、数据收集、监控或跟踪物体等许多应用中。如今,许多任务都要求无人机在大范围内操作或在严格的时间内完成任务。使用单个无人机可能不满足性能要求,因为它的小尺寸和有限的电池。在这种情况下,多架无人机(uav)已经成为解决这些限制的有效措施。一组无人机协同工作可以提供比单独使用强大的无人机更高效、更经济的解决方案。为了更好地利用多无人机系统,编队无人机的控制是一个需要克服的关键挑战。因此,群体控制已成为一个活跃的研究课题,受到研究者的高度关注。人们对编队控制问题进行了广泛的研究,并提出了许多控制协议。本文综述了文献中对种群控制的深入研究。每种方法都基于不同的标准进行了研究,这突出了其独特的优点和缺点。为读者今后在编队控制领域的研究提供参考。最后,对研究中存在的挑战和研究方向进行了讨论。
{"title":"Formation Control Algorithms for Multiple-UAVs: A Comprehensive Survey","authors":"Hai T. Do, Hoang T. Hua, M. Nguyen, Cuong V. Nguyen, H. T. Nguyen, Hoa T. Nguyen, N. T. Nguyen","doi":"10.4108/eai.10-6-2021.170230","DOIUrl":"https://doi.org/10.4108/eai.10-6-2021.170230","url":null,"abstract":"Unmanned aerial vehicles (UAVs) have been widely deployed in many applications such as transportation, data collection, monitoring, or tracking objects. Nowadays, numerous missions require UAVs to operate in a large area or to complete missions in a stringent period of time. Using a single UAV may not meet the performance requirements because of its small size and limited battery. In this situation, multiple Unmanned Aerial Vehicles (UAVs) have emerged as an e ff ective measure that can address these limitations. A group of UAVs cooperatively working together could o ff er a solution that is more e ffi cient and economical than using a powerful UAV alone. To better utilizing the multiple-UAVs system, control of formation UAVs is a critical challenge that needs to overcome. Therefore, formation control has become an active research topic that gains great attention from researchers. Extensive research e ff orts have been dedicated to studying the formation control problem with numerous control protocols which have been proposed. This paper reviews the profound studies on formation control in literature. Each approach is investigated based on di ff erent criteria, which highlights its distinct merits and demerits. The comparison is provided to facilitate the readers in their future researches in the field of formation control. Finally, some open challenges and research directions are also discussed.","PeriodicalId":33474,"journal":{"name":"EAI Endorsed Transactions on Industrial Networks and Intelligent Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75653557","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 25
Performance Analysis for RF Energy Harvesting Mobile Edge Computing Networks with SIMO/MISO-NOMA Schemes 基于SIMO/MISO-NOMA方案的射频能量采集移动边缘计算网络性能分析
Q2 Engineering Pub Date : 2021-04-28 DOI: 10.4108/EAI.28-4-2021.169425
Dac-Binh Ha, Van-Truong Truong, Yoonill Lee
In this paper, we study an RF energy harvesting mobile edge computing network based on a SIMO/MISO system and NOMA schemes over Nakagami-m fading. Specifically, a multi-antenna user harvests RF energy from a power station by using a selection combining/maximal ratio combining scheme and offload its tasks to two MEC servers through downlink NOMA by employing transmit antenna selection/maximal ratio transmission scheme. Accordingly, we investigate the performance of six schemes, namely SC-TAS1, SC-TAS1, MRC-TAS1, MRC-TAS2, SC-MRT, and MRC-MRT, for this considered system. To evaluate the performance, exact closedform expressions of successful computation probability are derived. We further propose the optimal algorithm to find the best parameter sets to achieve the best performance. Moreover, the impacts of the network parameters on the system performance for these schemes are investigated. Finally, the simulation results are also provided to verify the accuracy of our analysis. Received on 29 March 2021; accepted on 19 April 2021; published on 28 April 2021
本文研究了一种基于SIMO/MISO系统和NOMA方案的Nakagami-m衰落下射频能量收集移动边缘计算网络。具体而言,多天线用户采用选择组合/最大比组合方案从电站获取射频能量,并采用发射天线选择/最大比传输方案通过下行NOMA将任务卸载给两台MEC服务器。因此,我们研究了六种方案的性能,即SC-TAS1、SC-TAS1、MRC-TAS1、MRC-TAS2、SC-MRT和MRC-MRT。为了评价性能,导出了计算成功概率的精确封闭表达式。我们进一步提出了最优算法来寻找最佳的参数集,以达到最佳的性能。此外,还研究了网络参数对系统性能的影响。最后给出了仿真结果,验证了分析的准确性。2021年3月29日收到;2021年4月19日接受;于2021年4月28日发布
{"title":"Performance Analysis for RF Energy Harvesting Mobile Edge Computing Networks with SIMO/MISO-NOMA Schemes","authors":"Dac-Binh Ha, Van-Truong Truong, Yoonill Lee","doi":"10.4108/EAI.28-4-2021.169425","DOIUrl":"https://doi.org/10.4108/EAI.28-4-2021.169425","url":null,"abstract":"In this paper, we study an RF energy harvesting mobile edge computing network based on a SIMO/MISO system and NOMA schemes over Nakagami-m fading. Specifically, a multi-antenna user harvests RF energy from a power station by using a selection combining/maximal ratio combining scheme and offload its tasks to two MEC servers through downlink NOMA by employing transmit antenna selection/maximal ratio transmission scheme. Accordingly, we investigate the performance of six schemes, namely SC-TAS1, SC-TAS1, MRC-TAS1, MRC-TAS2, SC-MRT, and MRC-MRT, for this considered system. To evaluate the performance, exact closedform expressions of successful computation probability are derived. We further propose the optimal algorithm to find the best parameter sets to achieve the best performance. Moreover, the impacts of the network parameters on the system performance for these schemes are investigated. Finally, the simulation results are also provided to verify the accuracy of our analysis. Received on 29 March 2021; accepted on 19 April 2021; published on 28 April 2021","PeriodicalId":33474,"journal":{"name":"EAI Endorsed Transactions on Industrial Networks and Intelligent Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-04-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89972073","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
期刊
EAI Endorsed Transactions on Industrial Networks and Intelligent Systems
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1