首页 > 最新文献

Bulletin of Electrical Engineering and Informatics最新文献

英文 中文
A low-cost Wi-Fi smart home socket using internet of things 使用物联网的低成本 Wi-Fi 智能家居插座
Q2 Mathematics Pub Date : 2024-04-01 DOI: 10.11591/eei.v13i2.6521
Ahmad Danish Suffian Ahmad Taufik, R. Abdullah, A. Jaafar, Nik Nur Shaadah Nik Dzulkefli, S. I. Ismail
With the emergence of smart home appliances, traditional power sockets are becoming less compatible with modern living styles. Furthermore, modern commercialized sockets are expensive and unaffordable. This project presents the development of a low-cost Wi-Fi smart home socket using internet of things (IoT) technology that is user-friendly for smartphone users to control home appliances. Smart home socket devices can turn on and off power outlets automatically from any location if they are linked to the internet and providing the user with more convenience and energy savings. This project uses a node microcontroller unit (NodeMCU) Wi-Fi module (ESP8266) as the main microcontroller unit to connect to a cloud platform. It also uses a mobile phone application to send instructions to the microcontroller for turning on and off household appliances remotely through a smart socket. The switching mechanism is monitored and controlled through the Blynk platform. A 4-channel relay module is used to transition DC current loads to AC current loads in order to activate switching processes. According to the study’s findings, the Wi-Fi smart home socket system is able to save on excessive usage of electrical appliances while also increasing electrical appliance safety.
随着智能家用电器的出现,传统电源插座越来越不符合现代生活方式。此外,现代商业化插座价格昂贵,难以负担。本项目利用物联网(IoT)技术开发了一种低成本的 Wi-Fi 智能插座,方便智能手机用户控制家用电器。智能家居插座设备只要与互联网连接,就能在任何地点自动打开或关闭电源插座,为用户提供更多便利和节能效果。本项目使用节点微控制器单元(NodeMCU)Wi-Fi 模块(ESP8266)作为主微控制器单元,连接到云平台。它还使用手机应用程序向微控制器发送指令,以便通过智能插座远程开关家用电器。开关机制通过 Blynk 平台进行监测和控制。一个 4 通道继电器模块用于将直流电流负载转换为交流电流负载,以启动开关过程。研究结果表明,Wi-Fi 智能家居插座系统能够节省电器的过度使用,同时还能提高电器的安全性。
{"title":"A low-cost Wi-Fi smart home socket using internet of things","authors":"Ahmad Danish Suffian Ahmad Taufik, R. Abdullah, A. Jaafar, Nik Nur Shaadah Nik Dzulkefli, S. I. Ismail","doi":"10.11591/eei.v13i2.6521","DOIUrl":"https://doi.org/10.11591/eei.v13i2.6521","url":null,"abstract":"With the emergence of smart home appliances, traditional power sockets are becoming less compatible with modern living styles. Furthermore, modern commercialized sockets are expensive and unaffordable. This project presents the development of a low-cost Wi-Fi smart home socket using internet of things (IoT) technology that is user-friendly for smartphone users to control home appliances. Smart home socket devices can turn on and off power outlets automatically from any location if they are linked to the internet and providing the user with more convenience and energy savings. This project uses a node microcontroller unit (NodeMCU) Wi-Fi module (ESP8266) as the main microcontroller unit to connect to a cloud platform. It also uses a mobile phone application to send instructions to the microcontroller for turning on and off household appliances remotely through a smart socket. The switching mechanism is monitored and controlled through the Blynk platform. A 4-channel relay module is used to transition DC current loads to AC current loads in order to activate switching processes. According to the study’s findings, the Wi-Fi smart home socket system is able to save on excessive usage of electrical appliances while also increasing electrical appliance safety.","PeriodicalId":37619,"journal":{"name":"Bulletin of Electrical Engineering and Informatics","volume":"58 26","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140356747","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Definite time over-current protection on transmission line using MATLAB/Simulink 使用 MATLAB/Simulink 对输电线路进行定时过流保护
Q2 Mathematics Pub Date : 2024-04-01 DOI: 10.11591/eei.v13i2.5301
T. A. Taha, Hussein I. Zaynal, A. T. T. Hussain, H. Desa, Faris Hassan Taha
This paper has investigated the application of the definite time over-current (DTOC) which reacts to protect the breaker from damage during the occurrence of over-current in the transmission lines. After a distance relay, this kind of over-current relay is utilized as backup protection. The overcurrent relay will provide a signal after a predetermined amount of time delay, and the breaker will trip if the distance relay does not detect a line failure. As a result, this over-current relay functions with a time delay that is just slightly longer than the combined working times of the distance relay and the breaker. This DTOC is tested for various types of faults which are 3- phase fault occurring at load 1, 3-phase fault occurring at load 2, a 3-phase fault occurring before primary protection, and the behaviour of voltage and current with a failed primary protection. All the results will be obtained using the MATLAB/Simulink software package.
本文研究了定时过电流(DTOC)的应用,它能在输电线路发生过电流时做出反应,保护断路器免受损坏。在距离继电器之后,这种过流继电器被用作后备保护。过流继电器会在预定的延时后发出信号,如果距离继电器没有检测到线路故障,断路器就会跳闸。因此,该过流继电器的延时仅略微长于距离继电器和断路器的工作时间总和。该 DTOC 针对各种类型的故障进行了测试,包括负载 1 发生的三相故障、负载 2 发生的三相故障、一次保护前发生的三相故障以及一次保护失灵时的电压和电流特性。所有结果都将通过 MATLAB/Simulink 软件包获得。
{"title":"Definite time over-current protection on transmission line using MATLAB/Simulink","authors":"T. A. Taha, Hussein I. Zaynal, A. T. T. Hussain, H. Desa, Faris Hassan Taha","doi":"10.11591/eei.v13i2.5301","DOIUrl":"https://doi.org/10.11591/eei.v13i2.5301","url":null,"abstract":"This paper has investigated the application of the definite time over-current (DTOC) which reacts to protect the breaker from damage during the occurrence of over-current in the transmission lines. After a distance relay, this kind of over-current relay is utilized as backup protection. The overcurrent relay will provide a signal after a predetermined amount of time delay, and the breaker will trip if the distance relay does not detect a line failure. As a result, this over-current relay functions with a time delay that is just slightly longer than the combined working times of the distance relay and the breaker. This DTOC is tested for various types of faults which are 3- phase fault occurring at load 1, 3-phase fault occurring at load 2, a 3-phase fault occurring before primary protection, and the behaviour of voltage and current with a failed primary protection. All the results will be obtained using the MATLAB/Simulink software package.","PeriodicalId":37619,"journal":{"name":"Bulletin of Electrical Engineering and Informatics","volume":"6 4","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140357055","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Effective privacy preserving in cloud computing using position aware Merkle tree model 利用位置感知梅克尔树模型在云计算中有效保护隐私
Q2 Mathematics Pub Date : 2024-04-01 DOI: 10.11591/eei.v13i2.6636
Shruthi Gangadharaiah, Purohit Shrinivasacharya
In this research manuscript, a new protocol is proposed for predicting the available space in the cloud and verifying the security of stored data. The protocol is utilized for learning the available data, and based on this learning, the available storage space is identified, after which the cloud service providers allow for data storage. The Integrity verification separates the private and the public data, which avoids privacy issues. The integration of the private data is done with the help of cloud service providers with respect to the third-party auditing (TPA). Earlier, public key cryptography and bilinear map technologies have been combined by the researchers, but the computation time and costs were high. To secure the integrity of the data storage, the client should execute several computations. Therefore, this research suggests a reliable and effective method called position-aware Merkle tree (PMT), which is implemented for ensuring data integrity. The proposed system uses a PMT that enables the TPA to perform multiple auditing tasks with high efficiency, less computational cost and computation time. Simulation results clearly shows that the developed PMT method consumed 0.00459 milliseconds of computation time, which is limited when compared to the existing models.
本研究手稿提出了一种新协议,用于预测云中的可用空间并验证存储数据的安全性。该协议用于学习可用数据,并在此基础上确定可用存储空间,然后云服务提供商允许存储数据。完整性验证将私人数据和公共数据分开,从而避免了隐私问题。私人数据的整合是在第三方审计(TPA)方面的云服务提供商的帮助下完成的。早些时候,研究人员曾将公钥加密技术和双线性映射技术相结合,但计算时间长、成本高。为了确保数据存储的完整性,客户端需要执行多次计算。因此,本研究提出了一种可靠而有效的方法,称为位置感知梅克尔树(PMT),用于确保数据完整性。建议的系统使用 PMT,使 TPA 能够以较高的效率、较少的计算成本和计算时间执行多项审计任务。仿真结果清楚地表明,所开发的 PMT 方法消耗的计算时间为 0.00459 毫秒,与现有模型相比是有限的。
{"title":"Effective privacy preserving in cloud computing using position aware Merkle tree model","authors":"Shruthi Gangadharaiah, Purohit Shrinivasacharya","doi":"10.11591/eei.v13i2.6636","DOIUrl":"https://doi.org/10.11591/eei.v13i2.6636","url":null,"abstract":"In this research manuscript, a new protocol is proposed for predicting the available space in the cloud and verifying the security of stored data. The protocol is utilized for learning the available data, and based on this learning, the available storage space is identified, after which the cloud service providers allow for data storage. The Integrity verification separates the private and the public data, which avoids privacy issues. The integration of the private data is done with the help of cloud service providers with respect to the third-party auditing (TPA). Earlier, public key cryptography and bilinear map technologies have been combined by the researchers, but the computation time and costs were high. To secure the integrity of the data storage, the client should execute several computations. Therefore, this research suggests a reliable and effective method called position-aware Merkle tree (PMT), which is implemented for ensuring data integrity. The proposed system uses a PMT that enables the TPA to perform multiple auditing tasks with high efficiency, less computational cost and computation time. Simulation results clearly shows that the developed PMT method consumed 0.00459 milliseconds of computation time, which is limited when compared to the existing models.","PeriodicalId":37619,"journal":{"name":"Bulletin of Electrical Engineering and Informatics","volume":"26 2","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140353832","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Sentiment analysis with hotel customer reviews using FNet 使用 FNet 对酒店客户评论进行情感分析
Q2 Mathematics Pub Date : 2024-04-01 DOI: 10.11591/eei.v13i2.6301
Shovan Bhowmik, Rifat Sadik, Wahiduzzaman Akanda, Juboraj Roy Pavel
Recent research has focused on opinion mining from public sentiments using natural language processing (NLP) and machine learning (ML) techniques. Transformer-based models, such as bidirectional encoder representations from transformers (BERT), excel in extracting semantic information but are resourceintensive. Google’s new research, mixing tokens with fourier transform, also known as FNet, replaced BERT’s attention mechanism with a non-parameterized fourier transform, aiming to reduce training time without compromising performance. This study fine-tuned the FNet model with a publicly available Kaggle hotel review dataset and investigated the performance of this dataset in both FNet and BERT architectures along with conventional machine learning models such as long short-term memory (LSTM) and support vector machine (SVM). Results revealed that FNet significantly reduces the training time by almost 20% and memory utilization by nearly 60% compared to BERT. The highest test accuracy observed in this experiment by FNet was 80.27% which is nearly 97.85% of BERT’s performance with identical parameters.
近期的研究重点是利用自然语言处理(NLP)和机器学习(ML)技术从公众情绪中挖掘观点。基于变换器的模型,如来自变换器的双向编码器表示(BERT),在提取语义信息方面表现出色,但却是资源密集型的。谷歌的新研究 "混合标记与傅立叶变换"(又称 FNet)用非参数化的傅立叶变换取代了 BERT 的注意机制,旨在减少训练时间,同时不影响性能。本研究利用公开的 Kaggle 酒店点评数据集对 FNet 模型进行了微调,并研究了该数据集在 FNet 和 BERT 架构下的性能,以及长短期记忆(LSTM)和支持向量机(SVM)等传统机器学习模型的性能。结果显示,与 BERT 相比,FNet 大幅减少了近 20% 的训练时间和近 60% 的内存使用率。在该实验中,FNet 的最高测试准确率为 80.27%,在参数相同的情况下,接近 BERT 性能的 97.85%。
{"title":"Sentiment analysis with hotel customer reviews using FNet","authors":"Shovan Bhowmik, Rifat Sadik, Wahiduzzaman Akanda, Juboraj Roy Pavel","doi":"10.11591/eei.v13i2.6301","DOIUrl":"https://doi.org/10.11591/eei.v13i2.6301","url":null,"abstract":"Recent research has focused on opinion mining from public sentiments using natural language processing (NLP) and machine learning (ML) techniques. Transformer-based models, such as bidirectional encoder representations from transformers (BERT), excel in extracting semantic information but are resourceintensive. Google’s new research, mixing tokens with fourier transform, also known as FNet, replaced BERT’s attention mechanism with a non-parameterized fourier transform, aiming to reduce training time without compromising performance. This study fine-tuned the FNet model with a publicly available Kaggle hotel review dataset and investigated the performance of this dataset in both FNet and BERT architectures along with conventional machine learning models such as long short-term memory (LSTM) and support vector machine (SVM). Results revealed that FNet significantly reduces the training time by almost 20% and memory utilization by nearly 60% compared to BERT. The highest test accuracy observed in this experiment by FNet was 80.27% which is nearly 97.85% of BERT’s performance with identical parameters.","PeriodicalId":37619,"journal":{"name":"Bulletin of Electrical Engineering and Informatics","volume":"46 3","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140357696","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Squirrel search method for deep learning-based anomaly identification in videos 基于深度学习的视频异常识别松鼠搜索法
Q2 Mathematics Pub Date : 2024-04-01 DOI: 10.11591/eei.v13i2.5933
Laxmikant Malphedwar, Thevasigamani Rajesh Kumar
The monitoring of human behavior and traffic surveillance in various locations has become increasingly important in recent years. However, identifying abnormal activity in real-world settings is a challenging task due to the many different types of worrisome and abnormal actions, including theft, violence, and accidents. To address this issue, this paper proposes a new framework for deep learning-based anomaly identification in videos using the squirrel search algorithm and bidirectional long short-term memory (BiLSTM). The proposed method combines the squirrel search algorithm, an optimization technique inspired by nature, with BiLSTM for anomaly recognition. The framework uses the knowledge gained from a sequence of frames to categorize the video as either typical or abnormal. The proposed method was exhaustively tested in several benchmark datasets for anomaly detection to confirm its functionality in challenging surveillance circumstances. The results show that the proposed framework outperforms existing methods in terms of area under curve (AUC) values, with a test set AUC score of 93.1%. The paper also discusses the importance of feature selection and the benefits of using BiLSTM over traditional unidirectional long short-term memory (LSTM) models for anomaly detection in videos. Overall, the proposed framework provides a highly precise computerization of the system, making it an effective tool for identifying abnormal human behavior in surveillance footage.
近年来,对不同地点的人类行为和交通监控的监测变得越来越重要。然而,由于令人担忧的异常行为种类繁多,包括盗窃、暴力和事故等,在现实世界中识别异常活动是一项极具挑战性的任务。为解决这一问题,本文提出了一种基于深度学习的视频异常识别新框架,使用松鼠搜索算法和双向长短期记忆(BiLSTM)。所提出的方法将松鼠搜索算法(一种受自然启发的优化技术)与 BiLSTM 结合起来,用于异常识别。该框架利用从帧序列中获得的知识将视频分为典型或异常两类。在多个异常检测基准数据集中对所提出的方法进行了详尽测试,以确认其在具有挑战性的监控环境中的功能。结果表明,所提出的框架在曲线下面积(AUC)值方面优于现有方法,测试集的 AUC 得分为 93.1%。论文还讨论了特征选择的重要性,以及在视频异常检测中使用 BiLSTM 而非传统的单向长短期记忆(LSTM)模型的好处。总之,所提出的框架为系统提供了高度精确的计算机化,使其成为识别监控录像中异常人类行为的有效工具。
{"title":"Squirrel search method for deep learning-based anomaly identification in videos","authors":"Laxmikant Malphedwar, Thevasigamani Rajesh Kumar","doi":"10.11591/eei.v13i2.5933","DOIUrl":"https://doi.org/10.11591/eei.v13i2.5933","url":null,"abstract":"The monitoring of human behavior and traffic surveillance in various locations has become increasingly important in recent years. However, identifying abnormal activity in real-world settings is a challenging task due to the many different types of worrisome and abnormal actions, including theft, violence, and accidents. To address this issue, this paper proposes a new framework for deep learning-based anomaly identification in videos using the squirrel search algorithm and bidirectional long short-term memory (BiLSTM). The proposed method combines the squirrel search algorithm, an optimization technique inspired by nature, with BiLSTM for anomaly recognition. The framework uses the knowledge gained from a sequence of frames to categorize the video as either typical or abnormal. The proposed method was exhaustively tested in several benchmark datasets for anomaly detection to confirm its functionality in challenging surveillance circumstances. The results show that the proposed framework outperforms existing methods in terms of area under curve (AUC) values, with a test set AUC score of 93.1%. The paper also discusses the importance of feature selection and the benefits of using BiLSTM over traditional unidirectional long short-term memory (LSTM) models for anomaly detection in videos. Overall, the proposed framework provides a highly precise computerization of the system, making it an effective tool for identifying abnormal human behavior in surveillance footage.","PeriodicalId":37619,"journal":{"name":"Bulletin of Electrical Engineering and Informatics","volume":"1 6","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140352951","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design and implementation of energy-efficient hybrid data aggregation in heterogeneous wireless sensor network 异构无线传感器网络中高能效混合数据聚合的设计与实现
Q2 Mathematics Pub Date : 2024-04-01 DOI: 10.11591/eei.v13i2.5582
M. M. Al-Heeti, Jamal A. Hammad, Ahmed Shamil Mustafa
Heterogeneous wireless sensor network (HWSN) is a trending technology in both the industrial and academic sectors, consisting of a large number of interconnected sensors. However, higher energy consumption and delay are significant drawbacks of this technology in applications such as military, healthcare, and industrial automation. The main objective of this research is to enhance the energy efficiency of HWSN using a clustering technique. In this article, a novel approach, namely power optimization and hybrid data aggregation (POHDA), is proposed to address these challenges in HWSN. POHDA-HWSN focuses on power optimization and congestion avoidance through effective CH selection using hybrid data aggregation based on parameters such as residual energy, distance, mobility, threshold value of the node, and latency. By weight-based effective cluster head (CH) selection, the energy consumption, end-to-end delay, and overhead during communication are reduced in this network. The POHDA-HWSN approach considers specific parameters to compare the results and outcomes with earlier research such as HCCS-WSN, FMCA-WSN, and APCC-WSN. The results prove that the proposed POHDA-HWSN approach achieves higher energy efficiency and delivery ratio.
异构无线传感器网络(HWSN)由大量相互连接的传感器组成,是工业和学术领域的一种趋势性技术。然而,在军事、医疗保健和工业自动化等应用中,较高的能耗和延迟是该技术的明显缺点。本研究的主要目标是利用聚类技术提高 HWSN 的能效。本文提出了一种新方法,即功率优化和混合数据聚合(POHDA),以应对 HWSN 中的这些挑战。POHDA-HWSN 侧重于通过基于剩余能量、距离、移动性、节点阈值和延迟等参数的混合数据聚合来选择有效的簇头(CH),从而实现功率优化和避免拥塞。通过基于权重的有效簇头(CH)选择,该网络的能耗、端到端延迟和通信过程中的开销都有所降低。POHDA-HWSN 方法考虑了特定的参数,并将结果和成果与 HCCS-WSN、FMCA-WSN 和 APCC-WSN 等早期研究进行了比较。结果证明,所提出的 POHDA-HWSN 方法实现了更高的能效和传输率。
{"title":"Design and implementation of energy-efficient hybrid data aggregation in heterogeneous wireless sensor network","authors":"M. M. Al-Heeti, Jamal A. Hammad, Ahmed Shamil Mustafa","doi":"10.11591/eei.v13i2.5582","DOIUrl":"https://doi.org/10.11591/eei.v13i2.5582","url":null,"abstract":"Heterogeneous wireless sensor network (HWSN) is a trending technology in both the industrial and academic sectors, consisting of a large number of interconnected sensors. However, higher energy consumption and delay are significant drawbacks of this technology in applications such as military, healthcare, and industrial automation. The main objective of this research is to enhance the energy efficiency of HWSN using a clustering technique. In this article, a novel approach, namely power optimization and hybrid data aggregation (POHDA), is proposed to address these challenges in HWSN. POHDA-HWSN focuses on power optimization and congestion avoidance through effective CH selection using hybrid data aggregation based on parameters such as residual energy, distance, mobility, threshold value of the node, and latency. By weight-based effective cluster head (CH) selection, the energy consumption, end-to-end delay, and overhead during communication are reduced in this network. The POHDA-HWSN approach considers specific parameters to compare the results and outcomes with earlier research such as HCCS-WSN, FMCA-WSN, and APCC-WSN. The results prove that the proposed POHDA-HWSN approach achieves higher energy efficiency and delivery ratio.","PeriodicalId":37619,"journal":{"name":"Bulletin of Electrical Engineering and Informatics","volume":"8 9","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140353288","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Simulation of autonomous navigation of turtlebot robot system based on robot operating system 基于机器人操作系统的海龟机器人自主导航仿真系统
Q2 Mathematics Pub Date : 2024-04-01 DOI: 10.11591/eei.v13i2.6419
M. Ghazal, Murtadha Al-Ghadhanfari, N. Waisi
Complex system science has recently shifted its focus to include modeling, simulation, and behavior control. An effective simulation software built on robot operating system (ROS) is used in robotics development to facilitate the smooth transition between the simulation environment and the hardware testing of control behavior. In this paper, we demonstrate how the simultaneous localization and mapping (SLAM) algorithm can be used to allow a robot to navigate autonomously. The Gazebo is used to simulate the robot, and Rviz is used to visualize the simulated data. The G-mapping package is used to create maps using collected data from a variety of sensors, including laser and odometry. To test and implement autonomous navigation, a Turtlebot was used in a Gazebo-generated simulated environment. In our opinion, additional study on ROS using these important tools might lead to a greater adoption of robotics tests performed, further evaluation automation, and efficient robotic systems.
最近,复杂系统科学的重点已转向建模、仿真和行为控制。建立在机器人操作系统(ROS)基础上的有效仿真软件被用于机器人开发,以促进仿真环境与控制行为硬件测试之间的平稳过渡。在本文中,我们演示了如何利用同步定位和映射(SLAM)算法让机器人自主导航。Gazebo 用于模拟机器人,Rviz 用于可视化模拟数据。G-mapping 软件包用于利用从各种传感器(包括激光和里程计)收集的数据创建地图。为了测试和实现自主导航,我们在 Gazebo 生成的模拟环境中使用了 Turtlebot。我们认为,利用这些重要工具对 ROS 进行更多的研究,可能会使机器人测试得到更广泛的采用,进一步实现评估自动化和高效的机器人系统。
{"title":"Simulation of autonomous navigation of turtlebot robot system based on robot operating system","authors":"M. Ghazal, Murtadha Al-Ghadhanfari, N. Waisi","doi":"10.11591/eei.v13i2.6419","DOIUrl":"https://doi.org/10.11591/eei.v13i2.6419","url":null,"abstract":"Complex system science has recently shifted its focus to include modeling, simulation, and behavior control. An effective simulation software built on robot operating system (ROS) is used in robotics development to facilitate the smooth transition between the simulation environment and the hardware testing of control behavior. In this paper, we demonstrate how the simultaneous localization and mapping (SLAM) algorithm can be used to allow a robot to navigate autonomously. The Gazebo is used to simulate the robot, and Rviz is used to visualize the simulated data. The G-mapping package is used to create maps using collected data from a variety of sensors, including laser and odometry. To test and implement autonomous navigation, a Turtlebot was used in a Gazebo-generated simulated environment. In our opinion, additional study on ROS using these important tools might lead to a greater adoption of robotics tests performed, further evaluation automation, and efficient robotic systems.","PeriodicalId":37619,"journal":{"name":"Bulletin of Electrical Engineering and Informatics","volume":"3 4","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140353336","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Reliability analysis in distribution system by deep belief neural network 利用深度信念神经网络进行配电系统可靠性分析
Q2 Mathematics Pub Date : 2024-04-01 DOI: 10.11591/eei.v13i2.6324
Likhitha Ramalingappa, Prathibha Ekanthaiah, MD Irfan Ali, Aswathnarayan Manjunatha
Rapid increase in the usage of intermittent renewable energy, ongoing changes in electrical power system structure and operational needs posing growing problems while ensuring adequate service reliability and retaining the quality of power. Power system reliability is a pertinent factor to consider while planning, designing, and operating distribution systems. utilities are obligated to offer their customers uninterrupted electrical service at the least cost while maintaining a satisfactory level of service quality. The important metrics for gauging the effect of distributed renewable energy on distribution networks is reliability analysis. Reliability analysis in distribution systems involves evaluating the performance and robustness of electrical distribution networks. An artificial intelligence approach is implemented in this paper to improve reliability analysis with dispersed generations in distribution network. Deep belief neural networks (DBNNs) are a type of artificial neural network that can be used for various tasks, including analyzing complex data such as those found in power distribution systems. This paper integrated a DBNN using a particle swarm optimization (PSO) technique. The proposed model performance is assessed using mean square error, mean absolute error, root mean square error, and R squared error. The findings reveal that reliability analysis with this novel technique is more accurate.
间歇性可再生能源的使用迅速增加,电力系统结构和运行需求不断变化,在确保充分的服务可靠性和保持电能质量的同时,也带来了越来越多的问题。电力系统的可靠性是规划、设计和运营配电系统时需要考虑的一个相关因素。电力公司有义务以最低成本为客户提供不间断的电力服务,同时保持令人满意的服务质量水平。衡量分布式可再生能源对配电网络影响的重要指标是可靠性分析。配电系统的可靠性分析包括评估配电网络的性能和稳健性。本文采用人工智能方法来改进配电网络中分散发电的可靠性分析。深度信念神经网络(DBNN)是一种人工神经网络,可用于各种任务,包括分析配电系统中的复杂数据。本文利用粒子群优化(PSO)技术整合了 DBNN。使用均方误差、平均绝对误差、均方根误差和 R 平方误差评估了所提出模型的性能。研究结果表明,使用这种新型技术进行可靠性分析更为准确。
{"title":"Reliability analysis in distribution system by deep belief neural network","authors":"Likhitha Ramalingappa, Prathibha Ekanthaiah, MD Irfan Ali, Aswathnarayan Manjunatha","doi":"10.11591/eei.v13i2.6324","DOIUrl":"https://doi.org/10.11591/eei.v13i2.6324","url":null,"abstract":"Rapid increase in the usage of intermittent renewable energy, ongoing changes in electrical power system structure and operational needs posing growing problems while ensuring adequate service reliability and retaining the quality of power. Power system reliability is a pertinent factor to consider while planning, designing, and operating distribution systems. utilities are obligated to offer their customers uninterrupted electrical service at the least cost while maintaining a satisfactory level of service quality. The important metrics for gauging the effect of distributed renewable energy on distribution networks is reliability analysis. Reliability analysis in distribution systems involves evaluating the performance and robustness of electrical distribution networks. An artificial intelligence approach is implemented in this paper to improve reliability analysis with dispersed generations in distribution network. Deep belief neural networks (DBNNs) are a type of artificial neural network that can be used for various tasks, including analyzing complex data such as those found in power distribution systems. This paper integrated a DBNN using a particle swarm optimization (PSO) technique. The proposed model performance is assessed using mean square error, mean absolute error, root mean square error, and R squared error. The findings reveal that reliability analysis with this novel technique is more accurate.","PeriodicalId":37619,"journal":{"name":"Bulletin of Electrical Engineering and Informatics","volume":"7 7","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140354292","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A novel women's ovulation prediction through salivary ferning using the box counting and deep learning 利用盒式计数和深度学习通过唾液拈取预测女性排卵的新方法
Q2 Mathematics Pub Date : 2024-04-01 DOI: 10.11591/eei.v13i2.5847
Heri Pratikno, Mohd Zamri Ibrahim, J. Jusak
There are several methods to predict a woman's ovulation time, including using a calendar system, basal body temperature, ovulation prediction kit, and OvuScope. This is the first study to predict the time of ovulation in women by calculating the results of detecting the fractal shape of the full ferning (FF) line pattern in salivary using pixel counting, box counting, and deep learning for computer vision methods. The peak of a woman's ovulation every month in her menstrual cycle occurs when the number of ferning lines is the most numerous or dense, and this condition is called FF. In this study, the computational results based on the visualization of the fractal shape of the salivary ferning line pattern from the pixel-counting method have an accuracy of 80%, while the fractal dimensions achieved by the box-counting are 1.474. On the other hand, using the deep learning image classification, we obtain the highest accuracy of 100% with a precision value of 1.00, recall of 1.00, and F1-score 1.00 on the pre-trained network model ResNet-18. Furthermore, visualization of the ResNet-34 model results in the highest number of patches, i.e., 586 patches (equal to 36,352 pixels), by applying fern-like lines pattern detection with windows size 8x8 pixels.
有几种方法可以预测女性的排卵时间,包括使用日历系统、基础体温、排卵预测套件和OvuScope。这是第一项利用像素计数、方框计数和计算机视觉深度学习方法,通过计算唾液中全分形线(FF)图案的检测结果来预测女性排卵时间的研究。女性每月月经周期的排卵高峰出现在栅格线数量最多或最密集的时候,这种情况被称为 FF。在这项研究中,基于像素计数法的唾液栅格线图案分形可视化计算结果的准确率为 80%,而盒式计数法获得的分形维数为 1.474。另一方面,利用深度学习进行图像分类,我们在预训练网络模型 ResNet-18 上获得了最高的准确率,准确率为 100%,精确度值为 1.00,召回率为 1.00,F1-score 为 1.00。此外,通过应用窗口大小为 8x8 像素的蕨类植物线条模式检测,ResNet-34 模型的可视化结果获得了最高的斑块数量,即 586 个斑块(等于 36,352 像素)。
{"title":"A novel women's ovulation prediction through salivary ferning using the box counting and deep learning","authors":"Heri Pratikno, Mohd Zamri Ibrahim, J. Jusak","doi":"10.11591/eei.v13i2.5847","DOIUrl":"https://doi.org/10.11591/eei.v13i2.5847","url":null,"abstract":"There are several methods to predict a woman's ovulation time, including using a calendar system, basal body temperature, ovulation prediction kit, and OvuScope. This is the first study to predict the time of ovulation in women by calculating the results of detecting the fractal shape of the full ferning (FF) line pattern in salivary using pixel counting, box counting, and deep learning for computer vision methods. The peak of a woman's ovulation every month in her menstrual cycle occurs when the number of ferning lines is the most numerous or dense, and this condition is called FF. In this study, the computational results based on the visualization of the fractal shape of the salivary ferning line pattern from the pixel-counting method have an accuracy of 80%, while the fractal dimensions achieved by the box-counting are 1.474. On the other hand, using the deep learning image classification, we obtain the highest accuracy of 100% with a precision value of 1.00, recall of 1.00, and F1-score 1.00 on the pre-trained network model ResNet-18. Furthermore, visualization of the ResNet-34 model results in the highest number of patches, i.e., 586 patches (equal to 36,352 pixels), by applying fern-like lines pattern detection with windows size 8x8 pixels.","PeriodicalId":37619,"journal":{"name":"Bulletin of Electrical Engineering and Informatics","volume":"3 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140354527","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Portable smart attendance system on Jetson Nano 基于 Jetson Nano 的便携式智能考勤系统
Q2 Mathematics Pub Date : 2024-04-01 DOI: 10.11591/eei.v13i2.6061
Edward Yose, Victor Victor, Nico Surantha
The masked face recognition-based attendance management system is an important biometric-based attendance tracking solution, especially in light of the COVID-19 pandemic. Despite the use of various methods and techniques for face detection and recognition, there currently needs to be a system that can accurately recognize individuals while they are wearing a mask. This system has been designed to overcome the challenges of widespread mask use, impacting the effectiveness of traditional face recognition-based attendance systems. The proposed system uses an innovative method that recognizes individuals even while wearing a mask without the need for removal. With its high compatibility and real-time operation, it can be easily integrated into schools and workplaces through an embedded system like the Jetson Nano or conventional computers executing attendance applications. This innovative approach and its compatibility make it a desirable solution for organizations looking to improve their attendance-tracking process. The Experimental results indicates using maximum resources possible the execution time needed on Jetson Nano is 15 to 22 seconds and 14 to 18 seconds respectively and the average frame capture if there are at least one face detected on Jetson Nano is 3-4 frames.
基于面具的人脸识别考勤管理系统是一种重要的生物识别考勤跟踪解决方案,尤其是在 COVID-19 大流行的情况下。尽管使用了各种方法和技术来进行人脸检测和识别,但目前仍需要一种能在佩戴面具时准确识别个人的系统。该系统旨在克服广泛使用面具所带来的挑战,这些挑战影响了基于人脸识别的传统考勤系统的有效性。拟议的系统采用了一种创新方法,即使在佩戴口罩时也能识别个人,无需摘下口罩。该系统具有高度兼容性和实时操作性,可通过 Jetson Nano 等嵌入式系统或执行考勤应用程序的传统计算机轻松集成到学校和工作场所。这种创新方法及其兼容性使其成为希望改进考勤跟踪流程的组织机构的理想解决方案。实验结果表明,在使用尽可能多的资源的情况下,Jetson Nano 上所需的执行时间分别为 15 至 22 秒和 14 至 18 秒,如果在 Jetson Nano 上至少检测到一张人脸,平均帧捕获时间为 3 至 4 帧。
{"title":"Portable smart attendance system on Jetson Nano","authors":"Edward Yose, Victor Victor, Nico Surantha","doi":"10.11591/eei.v13i2.6061","DOIUrl":"https://doi.org/10.11591/eei.v13i2.6061","url":null,"abstract":"The masked face recognition-based attendance management system is an important biometric-based attendance tracking solution, especially in light of the COVID-19 pandemic. Despite the use of various methods and techniques for face detection and recognition, there currently needs to be a system that can accurately recognize individuals while they are wearing a mask. This system has been designed to overcome the challenges of widespread mask use, impacting the effectiveness of traditional face recognition-based attendance systems. The proposed system uses an innovative method that recognizes individuals even while wearing a mask without the need for removal. With its high compatibility and real-time operation, it can be easily integrated into schools and workplaces through an embedded system like the Jetson Nano or conventional computers executing attendance applications. This innovative approach and its compatibility make it a desirable solution for organizations looking to improve their attendance-tracking process. The Experimental results indicates using maximum resources possible the execution time needed on Jetson Nano is 15 to 22 seconds and 14 to 18 seconds respectively and the average frame capture if there are at least one face detected on Jetson Nano is 3-4 frames.","PeriodicalId":37619,"journal":{"name":"Bulletin of Electrical Engineering and Informatics","volume":"14 7","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140356698","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Bulletin of Electrical Engineering and Informatics
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1