This paper deals with the punctureability of a steel plate by a projectile at different angles of attack. The effect of the projectile angle on the force required to penetrate a plate made of A36 steel is presented using Finite Element Method calculation software. Using Abaqus software, a dynamic model of a projectile striking a plate was modelled and the force required to penetrate a 5 mm thick steel plate was presented. The introduction gives an overview of the genesis of the topic and a brief historical background. The chapter on numerical analysis presents the numerical model used and how the simulation was modelled. In the conclusions, a summary of the results was formulated and conclusions were drawn regarding the observations and insights of the analysis. The force required to penetrate the plate was observed to increase with increasing projectile angle of attack and it was found that, as the angle of the plate increased, the force required to penetrate increased.
{"title":"ANALYSIS OF THE EFFECT OF PROJECTILE IMPACT ANGLE ON THE PUNCTURE OF A STEEL PLATE USING THE FINITE ELEMENT METHOD IN ABAQUS SOFTWARE","authors":"Kuba Rosłaniec","doi":"10.35784/acs-2022-5","DOIUrl":"https://doi.org/10.35784/acs-2022-5","url":null,"abstract":"This paper deals with the punctureability of a steel plate by a projectile at different angles of attack. The effect of the projectile angle on the force required to penetrate a plate made of A36 steel is presented using Finite Element Method calculation software. Using Abaqus software, a dynamic model of a projectile striking a plate was modelled and the force required to penetrate a 5 mm thick steel plate was presented. The introduction gives an overview of the genesis of the topic and a brief historical background. The chapter on numerical analysis presents the numerical model used and how the simulation was modelled. In the conclusions, a summary of the results was formulated and conclusions were drawn regarding the observations and insights of the analysis. The force required to penetrate the plate was observed to increase with increasing projectile angle of attack and it was found that, as the angle of the plate increased, the force required to penetrate increased. ","PeriodicalId":36379,"journal":{"name":"Applied Computer Science","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46651195","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jakub Anczarski, Adrian Bochen, MArcin Głąb, Mikolaj Jachowicz, J. Caban, R. Cechowicz
The latest market research (Fanuc Polska 2019) shows that the robotization of the Polish industry is accelerating. More and more companies are investing in robotic production lines, which enable greater efficiency of implemented processes and reduce labour costs. The article presents the possibilities of using virtual reality (VR) for behavioural analysis in open robotic systems with a shared workspace. The aim of the article is to develop a method of verification of programmed movements of an industrial robot in terms of safety and efficiency in systems with a shared workspace. The method of the robot program verification on the digital model of the working cell made in VR will be checked. The obtained research results indicate a great potential of this method in industrial applications as well as for educational purposes.
最新的市场研究(Fanuc Polska 2019)表明,波兰工业的机器人化正在加速。越来越多的公司正在投资机器人生产线,这可以提高实施过程的效率并降低劳动力成本。本文介绍了在具有共享工作空间的开放机器人系统中使用虚拟现实进行行为分析的可能性。本文的目的是开发一种在具有共享工作空间的系统中从安全性和效率的角度验证工业机器人程序化运动的方法。将检查在VR中制作的工作单元数字模型上进行机器人程序验证的方法。所获得的研究结果表明,这种方法在工业应用和教育目的方面具有巨大的潜力。
{"title":"A METHOD OF VERIFYING THE ROBOT'S TRAJECTORY FOR GOALS WITH A SHARED WORKSPACE","authors":"Jakub Anczarski, Adrian Bochen, MArcin Głąb, Mikolaj Jachowicz, J. Caban, R. Cechowicz","doi":"10.35784/acs-2022-3","DOIUrl":"https://doi.org/10.35784/acs-2022-3","url":null,"abstract":"The latest market research (Fanuc Polska 2019) shows that the robotization of the Polish industry is accelerating. More and more companies are investing in robotic production lines, which enable greater efficiency of implemented processes and reduce labour costs. The article presents the possibilities of using virtual reality (VR) for behavioural analysis in open robotic systems with a shared workspace. The aim of the article is to develop a method of verification of programmed movements of an industrial robot in terms of safety and efficiency in systems with a shared workspace. The method of the robot program verification on the digital model of the working cell made in VR will be checked. The obtained research results indicate a great potential of this method in industrial applications as well as for educational purposes.","PeriodicalId":36379,"journal":{"name":"Applied Computer Science","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46708683","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Computer systems are being employed in specialized professions such as medical diagnosis to alleviate some of the costs and to improve dependability and scalability. This paper implements a computer aided breast cancer diagnosis system. It utilizes the publicly available mini MIAS mammography image dataset. Images are preprocessed to clean isolate breast tissue region. Extracted regions are used to adjust and verify a pretrained convolutional deep neural network, the GoogLeNet. The implemented model shows good performance results compared to other published works with accuracy of 86.6%, sensitivity of 75% and specificity of 88.9%.
{"title":"BREAST CANCER CAD SYSTEM BY USING TRANSFER LEARNING AND ENHANCED ROI","authors":"Muayed S. Al-Huseiny, Ahmed S. Sajit","doi":"10.35784/acs-2022-8","DOIUrl":"https://doi.org/10.35784/acs-2022-8","url":null,"abstract":"Computer systems are being employed in specialized professions such as medical diagnosis to alleviate some of the costs and to improve dependability and scalability. This paper implements a computer aided breast cancer diagnosis system. It utilizes the publicly available mini MIAS mammography image dataset. Images are preprocessed to clean isolate breast tissue region. Extracted regions are used to adjust and verify a pretrained convolutional deep neural network, the GoogLeNet. The implemented model shows good performance results compared to other published works with accuracy of 86.6%, sensitivity of 75% and specificity of 88.9%. ","PeriodicalId":36379,"journal":{"name":"Applied Computer Science","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48127682","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Waldemar Suszynski, M. Charytanowicz, Wojciech Rosa, L. Koczan, R. Stegierski
Stuttering is a speech impediment that is a very complex disorder. It is difficult to diagnose and treat, and is of unknown initiation, despite the large number of studies in this field. Stuttering can take many forms and varies from person to person, and it can change under the influence of external factors. Diagnosing and treating speech disorders such as stuttering requires from a speech therapist, not only good profes-sional preparation, but also experience gained through research and practice in the field. The use of acoustic methods in combination with elements of artificial intelligence makes it possible to objectively assess the disorder, as well as to control the effects of treatment. The main aim of the study was to present an algorithm for automatic recognition of fillers disfluency in the statements of people who stutter. This is done on the basis of their parameterized features in the amplitude-frequency space. The work provides as well, exemplary results demonstrating their possibility and effectiveness. In order to verify and optimize the procedures, the statements of seven stutterers with duration of 2 to 4 minutes were selected. Over 70% efficiency and predictability of automatic detection of these disfluencies was achieved. The use of an automatic method in conjunction with therapy for a stuttering person can give us the opportunity to objectively assess the disorder, as well as to evaluate the progress of therapy.
{"title":"DETECTION OF FILLERS IN THE SPEECH BY PEOPLE WHO STUTTER","authors":"Waldemar Suszynski, M. Charytanowicz, Wojciech Rosa, L. Koczan, R. Stegierski","doi":"10.35784/acs-2021-28","DOIUrl":"https://doi.org/10.35784/acs-2021-28","url":null,"abstract":"Stuttering is a speech impediment that is a very complex disorder. It is difficult to diagnose and treat, and is of unknown initiation, despite the large number of studies in this field. Stuttering can take many forms and varies from person to person, and it can change under the influence of external factors. Diagnosing and treating speech disorders such as stuttering requires from a speech therapist, not only good profes-sional preparation, but also experience gained through research and practice in the field. The use of acoustic methods in combination with elements of artificial intelligence makes it possible to objectively assess the disorder, as well as to control the effects of treatment. The main aim of the study was to present an algorithm for automatic recognition of fillers disfluency in the statements of people who stutter. This is done on the basis of their parameterized features in the amplitude-frequency space. The work provides as well, exemplary results demonstrating their possibility and effectiveness. In order to verify and optimize the procedures, the statements of seven stutterers with duration of 2 to 4 minutes were selected. Over 70% efficiency and predictability of automatic detection of these disfluencies was achieved. The use of an automatic method in conjunction with therapy for a stuttering person can give us the opportunity to objectively assess the disorder, as well as to evaluate the progress of therapy.","PeriodicalId":36379,"journal":{"name":"Applied Computer Science","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46444546","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The classical n-body problem in physics addresses the prediction of individual motions of a group of celestial bodies under gravitational forces and has been studied since Isaac Newton formulated his laws. Nowadays the n-body problem has been recognized in many more fields of science and engineering. Each problem of mutual interaction between objects forming a dynamic group is called as the n-body problem. The cost of the direct algorithm for the problem is O(n2) and is not acceptable from the practical point of view. For this reason cheaper algorithms have been developed successfully reducing the cost to O(nln(n)) or even O(n). Because further improvement of the algorithms is unlikely to happen it is the hardware solutions which can still accelerate the calculations. The obvious answer here is a computer cluster that can preform the calculations in parallel. This paper focuses on the performance of a low-budget computer cluster created on ad hoc basis applied to n-body problem calculation. In order to maintain engineering valuable results a real technical issue was selected to study. It was Discrete Vortex Method that is used for simulating air flows. The presented research included writing original computer code, building a computer cluster, preforming simulations and comparing the results.
{"title":"PRODUCTIVITY OF A LOW-BUDGET COMPUTER CLUSTER APPLIED TO OVERCOME THE N-BODY PROBLEM","authors":"T. Nowicki, Adam Gregosiewicz, Z. Łagodowski","doi":"10.35784/acs-2021-32","DOIUrl":"https://doi.org/10.35784/acs-2021-32","url":null,"abstract":"The classical n-body problem in physics addresses the prediction of individual motions of a group of celestial bodies under gravitational forces and has been studied since Isaac Newton formulated his laws. Nowadays the n-body problem has been recognized in many more fields of science and engineering. Each problem of mutual interaction between objects forming a dynamic group is called as the n-body problem. The cost of the direct algorithm for the problem is O(n2) and is not acceptable from the practical point of view. For this reason cheaper algorithms have been developed successfully reducing the cost to O(nln(n)) or even O(n). Because further improvement of the algorithms is unlikely to happen it is the hardware solutions which can still accelerate the calculations. The obvious answer here is a computer cluster that can preform the calculations in parallel. This paper focuses on the performance of a low-budget computer cluster created on ad hoc basis applied to n-body problem calculation. In order to maintain engineering valuable results a real technical issue was selected to study. It was Discrete Vortex Method that is used for simulating air flows. The presented research included writing original computer code, building a computer cluster, preforming simulations and comparing the results.","PeriodicalId":36379,"journal":{"name":"Applied Computer Science","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48762965","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Nataliya Shabliy, S. Lupenko, N. Lutsyk, O. Yasniy, Olha Malyshevska
The primary objective of the paper was to determine the user based on its keystroke dynamics using the methods of machine learning. Such kind of a problem can be formulated as a classification task. To solve this task, four methods of supervised machine learning were employed, namely, logistic regression, support vector machines, random forest, and neural network. Each of three users typed the same word that had 7 symbols 600 times. The row of the dataset consists of 7 values that are the time period during which the particular key was pressed. The ground truth values are the user id. Before the application of machine learning classification methods, the features were transformed to z-score. The classification metrics were obtained for each applied method. The following parameters were determined: precision, recall, f1-score, support, prediction, and area under the receiver operating characteristic curve (AUC). The obtained AUC score was quite high. The lowest AUC score equal to 0.928 was achieved in the case of linear regression classifier. The highest AUC score was in the case of neural network classifier. The method of support vector machines and random forest showed slightly lower results as compared with neural network method. The same pattern is true for precision, recall and F1-score. Nevertheless, the obtained classification metrics are quite high in every case. Therefore, the methods of machine learning can be efficiently used to classify the user based on keystroke patterns. The most recommended method to solve such kind of a problem is neural network.
{"title":"KEYSTROKE DYNAMICS ANALYSIS USING MACHINE LEARNING METHODS","authors":"Nataliya Shabliy, S. Lupenko, N. Lutsyk, O. Yasniy, Olha Malyshevska","doi":"10.35784/acs-2021-30","DOIUrl":"https://doi.org/10.35784/acs-2021-30","url":null,"abstract":"The primary objective of the paper was to determine the user based on its keystroke dynamics using the methods of machine learning. Such kind of a problem can be formulated as a classification task. To solve this task, four methods of supervised machine learning were employed, namely, logistic regression, support vector machines, random forest, and neural network. Each of three users typed the same word that had 7 symbols 600 times. The row of the dataset consists of 7 values that are the time period during which the particular key was pressed. The ground truth values are the user id. Before the application of machine learning classification methods, the features were transformed to z-score. The classification metrics were obtained for each applied method. The following parameters were determined: precision, recall, f1-score, support, prediction, and area under the receiver operating characteristic curve (AUC). The obtained AUC score was quite high. The lowest AUC score equal to 0.928 was achieved in the case of linear regression classifier. The highest AUC score was in the case of neural network classifier. The method of support vector machines and random forest showed slightly lower results as compared with neural network method. The same pattern is true for precision, recall and F1-score. Nevertheless, the obtained classification metrics are quite high in every case. Therefore, the methods of machine learning can be efficiently used to classify the user based on keystroke patterns. The most recommended method to solve such kind of a problem is neural network.","PeriodicalId":36379,"journal":{"name":"Applied Computer Science","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44378304","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
J. Zubrzycki, A. Świć, Łukasz Sobaszek, J. Kovác, R. Králiková, R. Jencík, N. Šmídová, P. Arapi, Peter Dulenčin, Jozef Homza
The continuous development of production processes is currently observed in the fourth industrial revolution, where the key place is the digital transformation of production is known as Industry 4.0. The main technologies in the context of Industry 4.0 consist Cyber-Physical Systems (CPS) and Internet of Things (IoT), which create the capabilities needed for smart factories. Implementation of CPS solutions result in new possibilities creation – mainly in areas such as remote diagnosis, remote services, remote control, condition monitoring, etc. In this paper, authors indicated the importance of Cyber-Physical Systems in the process of the Industry 4.0 and the Smart Manufacturing development. Firstly, the basic information about Cyber-Physical Production Systems were outlined. Then, the alternative definitions and different authors view of the problem were discussed. Secondly, the conceptual model of Cybernetic Physical Production System was presented. Moreover, the case study of proposed solution implementation in the real manufacturing process was presented. The key stage of the verification concerned the obtained data analysis and results discussion.
{"title":"CYBER-PHYSICAL SYSTEMS TECHNOLOGIES AS A KEY FACTOR IN THE PROCESS OF INDUSTRY 4.0 AND SMART MANUFACTURING DEVELOPMENT","authors":"J. Zubrzycki, A. Świć, Łukasz Sobaszek, J. Kovác, R. Králiková, R. Jencík, N. Šmídová, P. Arapi, Peter Dulenčin, Jozef Homza","doi":"10.35784/acs-2021-31","DOIUrl":"https://doi.org/10.35784/acs-2021-31","url":null,"abstract":"The continuous development of production processes is currently observed in the fourth industrial revolution, where the key place is the digital transformation of production is known as Industry 4.0. The main technologies in the context of Industry 4.0 consist Cyber-Physical Systems (CPS) and Internet of Things (IoT), which create the capabilities needed for smart factories. Implementation of CPS solutions result in new possibilities creation – mainly in areas such as remote diagnosis, remote services, remote control, condition monitoring, etc. In this paper, authors indicated the importance of Cyber-Physical Systems in the process of the Industry 4.0 and the Smart Manufacturing development. Firstly, the basic information about Cyber-Physical Production Systems were outlined. Then, the alternative definitions and different authors view of the problem were discussed. Secondly, the conceptual model of Cybernetic Physical Production System was presented. Moreover, the case study of proposed solution implementation in the real manufacturing process was presented. The key stage of the verification concerned the obtained data analysis and results discussion.","PeriodicalId":36379,"journal":{"name":"Applied Computer Science","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46895668","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Adverse effects of inaccurate demand forecasts; stockouts, overstocks, customer loss have led academia and the business world towards accurate demand forecasting methods. Artificial Neural Network (ANN) is capable of highly accurate forecasts integrated with many variables. The use of Price and Promotion variables have increased the accuracy while the addition of other relevant variables would decrease the occurrences of errors. The use of the Federal Funds Rate as an additional macroeconomic variable to ANN forecasting models has been discussed in this research by the means of the accuracy measuring method: Average Relative Mean Absolute Error.
{"title":"ARTIFICIAL NEURAL NETWORK BASED DEMAND FORECASTING INTEGRATED WITH FEDERAL FUNDS RATE","authors":"Anupa Arachchige, Ranil Sugathadasa, Oshadhi Herath, Amila Thibbotuwawa","doi":"10.35784/acs-2021-27","DOIUrl":"https://doi.org/10.35784/acs-2021-27","url":null,"abstract":"Adverse effects of inaccurate demand forecasts; stockouts, overstocks, customer loss have led academia and the business world towards accurate demand forecasting methods. Artificial Neural Network (ANN) is capable of highly accurate forecasts integrated with many variables. The use of Price and Promotion variables have increased the accuracy while the addition of other relevant variables would decrease the occurrences of errors. The use of the Federal Funds Rate as an additional macroeconomic variable to ANN forecasting models has been discussed in this research by the means of the accuracy measuring method: Average Relative Mean Absolute Error.","PeriodicalId":36379,"journal":{"name":"Applied Computer Science","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42767372","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
These days, hardware devices and its associated activities are greatly impacted by threats amidst of various technologies. Hardware trojans are malicious modifications made to the circuitry of an integrated circuit, Exploiting such alterations and accessing the level of damage to devices is considered in this work. These trojans, when present in sensitive hardware system deployment, tends to have potential damage and infection to the system. This research builds a hardware trojan detector using machine learning techniques. The work uses a combination of logic testing and power side-channel analysis (SCA) coupled with machine learning for power traces. The model was trained, validated and tested using the acquired data, for 5 epochs. Preliminary logic tests were conducted on target hardware device as well as power SCA. The designed machine learning model was implemented using Arduino microcontroller and result showed that the hardware trojan detector identifies trojan chips with a reliable accuracy. The power consumption readings of the hardware characteristically start at 1035-1040mW and the power time-series data were simulated using DC power measurements mixed with additive white Gaussian noise (AWGN) with different standard deviations. The model achieves accuracy, precision and accurate recall values. Setting the threshold proba¬bility for the trojan class less than 0.5 however increases the recall, which is the most important metric for overall accuracy acheivement of over 95 percent after several epochs of training.
{"title":"IMPLEMENTATION OF A HARDWARE TROJAN CHIP DETECTOR MODEL USING ARDUINO MICROCONTROLLER","authors":"Kadeejah Abdulsalam, J. Adebisi, Victor Durojaiye","doi":"10.35784/acs-2021-26","DOIUrl":"https://doi.org/10.35784/acs-2021-26","url":null,"abstract":"These days, hardware devices and its associated activities are greatly impacted by threats amidst of various technologies. Hardware trojans are malicious modifications made to the circuitry of an integrated circuit, Exploiting such alterations and accessing the level of damage to devices is considered in this work. These trojans, when present in sensitive hardware system deployment, tends to have potential damage and infection to the system. This research builds a hardware trojan detector using machine learning techniques. The work uses a combination of logic testing and power side-channel analysis (SCA) coupled with machine learning for power traces. The model was trained, validated and tested using the acquired data, for 5 epochs. Preliminary logic tests were conducted on target hardware device as well as power SCA. The designed machine learning model was implemented using Arduino microcontroller and result showed that the hardware trojan detector identifies trojan chips with a reliable accuracy. The power consumption readings of the hardware characteristically start at 1035-1040mW and the power time-series data were simulated using DC power measurements mixed with additive white Gaussian noise (AWGN) with different standard deviations. The model achieves accuracy, precision and accurate recall values. Setting the threshold proba¬bility for the trojan class less than 0.5 however increases the recall, which is the most important metric for overall accuracy acheivement of over 95 percent after several epochs of training.","PeriodicalId":36379,"journal":{"name":"Applied Computer Science","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44390130","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The increasing electrification of powertrains leads to increased demands for the test technology to ensure the required functions. For conventional test rigs in particular, it is necessary to have knowledge of the test technology's capabilities that can be applied in practical testing. Modelling enables early knowledge of the test rigs dynamic capabilities and the feasibility of planned testing scenarios. This paper describes the modelling of complex subsystems by experimental modelling with artificial neural networks taking transmission efficiency as an example. For data generation, the experimental design and execution is described. The generated data is pre-processed with suitable methods and optimized for the neural networks. Modelling is executed with different variants of the inputs as well as different algorithms. The variants compare and compete with each other. The most suitable variant is validated using statistical methods and other adequate techniques. The result represents reality well and enables the performance investigation of the test systems in a realistic manner.
{"title":"BLACK BOX EFFICIENCY MODELLING OF AN ELECTRIC DRIVE UNIT UTILIZING METHODS OF MACHINE LEARNING","authors":"L. Bauer, Leon Stütz, M. Kley","doi":"10.35784/acs-2021-25","DOIUrl":"https://doi.org/10.35784/acs-2021-25","url":null,"abstract":"The increasing electrification of powertrains leads to increased demands for the test technology to ensure the required functions. For conventional test rigs in particular, it is necessary to have knowledge of the test technology's capabilities that can be applied in practical testing. Modelling enables early knowledge of the test rigs dynamic capabilities and the feasibility of planned testing scenarios. This paper describes the modelling of complex subsystems by experimental modelling with artificial neural networks taking transmission efficiency as an example. For data generation, the experimental design and execution is described. The generated data is pre-processed with suitable methods and optimized for the neural networks. Modelling is executed with different variants of the inputs as well as different algorithms. The variants compare and compete with each other. The most suitable variant is validated using statistical methods and other adequate techniques. The result represents reality well and enables the performance investigation of the test systems in a realistic manner.","PeriodicalId":36379,"journal":{"name":"Applied Computer Science","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45344110","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}