首页 > 最新文献

Bulletin of Electrical Engineering and Informatics最新文献

英文 中文
A low-cost Wi-Fi smart home socket using internet of things 使用物联网的低成本 Wi-Fi 智能家居插座
Q2 Mathematics Pub Date : 2024-04-01 DOI: 10.11591/eei.v13i2.6521
Ahmad Danish Suffian Ahmad Taufik, R. Abdullah, A. Jaafar, Nik Nur Shaadah Nik Dzulkefli, S. I. Ismail
With the emergence of smart home appliances, traditional power sockets are becoming less compatible with modern living styles. Furthermore, modern commercialized sockets are expensive and unaffordable. This project presents the development of a low-cost Wi-Fi smart home socket using internet of things (IoT) technology that is user-friendly for smartphone users to control home appliances. Smart home socket devices can turn on and off power outlets automatically from any location if they are linked to the internet and providing the user with more convenience and energy savings. This project uses a node microcontroller unit (NodeMCU) Wi-Fi module (ESP8266) as the main microcontroller unit to connect to a cloud platform. It also uses a mobile phone application to send instructions to the microcontroller for turning on and off household appliances remotely through a smart socket. The switching mechanism is monitored and controlled through the Blynk platform. A 4-channel relay module is used to transition DC current loads to AC current loads in order to activate switching processes. According to the study’s findings, the Wi-Fi smart home socket system is able to save on excessive usage of electrical appliances while also increasing electrical appliance safety.
随着智能家用电器的出现,传统电源插座越来越不符合现代生活方式。此外,现代商业化插座价格昂贵,难以负担。本项目利用物联网(IoT)技术开发了一种低成本的 Wi-Fi 智能插座,方便智能手机用户控制家用电器。智能家居插座设备只要与互联网连接,就能在任何地点自动打开或关闭电源插座,为用户提供更多便利和节能效果。本项目使用节点微控制器单元(NodeMCU)Wi-Fi 模块(ESP8266)作为主微控制器单元,连接到云平台。它还使用手机应用程序向微控制器发送指令,以便通过智能插座远程开关家用电器。开关机制通过 Blynk 平台进行监测和控制。一个 4 通道继电器模块用于将直流电流负载转换为交流电流负载,以启动开关过程。研究结果表明,Wi-Fi 智能家居插座系统能够节省电器的过度使用,同时还能提高电器的安全性。
{"title":"A low-cost Wi-Fi smart home socket using internet of things","authors":"Ahmad Danish Suffian Ahmad Taufik, R. Abdullah, A. Jaafar, Nik Nur Shaadah Nik Dzulkefli, S. I. Ismail","doi":"10.11591/eei.v13i2.6521","DOIUrl":"https://doi.org/10.11591/eei.v13i2.6521","url":null,"abstract":"With the emergence of smart home appliances, traditional power sockets are becoming less compatible with modern living styles. Furthermore, modern commercialized sockets are expensive and unaffordable. This project presents the development of a low-cost Wi-Fi smart home socket using internet of things (IoT) technology that is user-friendly for smartphone users to control home appliances. Smart home socket devices can turn on and off power outlets automatically from any location if they are linked to the internet and providing the user with more convenience and energy savings. This project uses a node microcontroller unit (NodeMCU) Wi-Fi module (ESP8266) as the main microcontroller unit to connect to a cloud platform. It also uses a mobile phone application to send instructions to the microcontroller for turning on and off household appliances remotely through a smart socket. The switching mechanism is monitored and controlled through the Blynk platform. A 4-channel relay module is used to transition DC current loads to AC current loads in order to activate switching processes. According to the study’s findings, the Wi-Fi smart home socket system is able to save on excessive usage of electrical appliances while also increasing electrical appliance safety.","PeriodicalId":37619,"journal":{"name":"Bulletin of Electrical Engineering and Informatics","volume":"58 26","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140356747","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Definite time over-current protection on transmission line using MATLAB/Simulink 使用 MATLAB/Simulink 对输电线路进行定时过流保护
Q2 Mathematics Pub Date : 2024-04-01 DOI: 10.11591/eei.v13i2.5301
T. A. Taha, Hussein I. Zaynal, A. T. T. Hussain, H. Desa, Faris Hassan Taha
This paper has investigated the application of the definite time over-current (DTOC) which reacts to protect the breaker from damage during the occurrence of over-current in the transmission lines. After a distance relay, this kind of over-current relay is utilized as backup protection. The overcurrent relay will provide a signal after a predetermined amount of time delay, and the breaker will trip if the distance relay does not detect a line failure. As a result, this over-current relay functions with a time delay that is just slightly longer than the combined working times of the distance relay and the breaker. This DTOC is tested for various types of faults which are 3- phase fault occurring at load 1, 3-phase fault occurring at load 2, a 3-phase fault occurring before primary protection, and the behaviour of voltage and current with a failed primary protection. All the results will be obtained using the MATLAB/Simulink software package.
本文研究了定时过电流(DTOC)的应用,它能在输电线路发生过电流时做出反应,保护断路器免受损坏。在距离继电器之后,这种过流继电器被用作后备保护。过流继电器会在预定的延时后发出信号,如果距离继电器没有检测到线路故障,断路器就会跳闸。因此,该过流继电器的延时仅略微长于距离继电器和断路器的工作时间总和。该 DTOC 针对各种类型的故障进行了测试,包括负载 1 发生的三相故障、负载 2 发生的三相故障、一次保护前发生的三相故障以及一次保护失灵时的电压和电流特性。所有结果都将通过 MATLAB/Simulink 软件包获得。
{"title":"Definite time over-current protection on transmission line using MATLAB/Simulink","authors":"T. A. Taha, Hussein I. Zaynal, A. T. T. Hussain, H. Desa, Faris Hassan Taha","doi":"10.11591/eei.v13i2.5301","DOIUrl":"https://doi.org/10.11591/eei.v13i2.5301","url":null,"abstract":"This paper has investigated the application of the definite time over-current (DTOC) which reacts to protect the breaker from damage during the occurrence of over-current in the transmission lines. After a distance relay, this kind of over-current relay is utilized as backup protection. The overcurrent relay will provide a signal after a predetermined amount of time delay, and the breaker will trip if the distance relay does not detect a line failure. As a result, this over-current relay functions with a time delay that is just slightly longer than the combined working times of the distance relay and the breaker. This DTOC is tested for various types of faults which are 3- phase fault occurring at load 1, 3-phase fault occurring at load 2, a 3-phase fault occurring before primary protection, and the behaviour of voltage and current with a failed primary protection. All the results will be obtained using the MATLAB/Simulink software package.","PeriodicalId":37619,"journal":{"name":"Bulletin of Electrical Engineering and Informatics","volume":"6 4","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140357055","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Effective privacy preserving in cloud computing using position aware Merkle tree model 利用位置感知梅克尔树模型在云计算中有效保护隐私
Q2 Mathematics Pub Date : 2024-04-01 DOI: 10.11591/eei.v13i2.6636
Shruthi Gangadharaiah, Purohit Shrinivasacharya
In this research manuscript, a new protocol is proposed for predicting the available space in the cloud and verifying the security of stored data. The protocol is utilized for learning the available data, and based on this learning, the available storage space is identified, after which the cloud service providers allow for data storage. The Integrity verification separates the private and the public data, which avoids privacy issues. The integration of the private data is done with the help of cloud service providers with respect to the third-party auditing (TPA). Earlier, public key cryptography and bilinear map technologies have been combined by the researchers, but the computation time and costs were high. To secure the integrity of the data storage, the client should execute several computations. Therefore, this research suggests a reliable and effective method called position-aware Merkle tree (PMT), which is implemented for ensuring data integrity. The proposed system uses a PMT that enables the TPA to perform multiple auditing tasks with high efficiency, less computational cost and computation time. Simulation results clearly shows that the developed PMT method consumed 0.00459 milliseconds of computation time, which is limited when compared to the existing models.
本研究手稿提出了一种新协议,用于预测云中的可用空间并验证存储数据的安全性。该协议用于学习可用数据,并在此基础上确定可用存储空间,然后云服务提供商允许存储数据。完整性验证将私人数据和公共数据分开,从而避免了隐私问题。私人数据的整合是在第三方审计(TPA)方面的云服务提供商的帮助下完成的。早些时候,研究人员曾将公钥加密技术和双线性映射技术相结合,但计算时间长、成本高。为了确保数据存储的完整性,客户端需要执行多次计算。因此,本研究提出了一种可靠而有效的方法,称为位置感知梅克尔树(PMT),用于确保数据完整性。建议的系统使用 PMT,使 TPA 能够以较高的效率、较少的计算成本和计算时间执行多项审计任务。仿真结果清楚地表明,所开发的 PMT 方法消耗的计算时间为 0.00459 毫秒,与现有模型相比是有限的。
{"title":"Effective privacy preserving in cloud computing using position aware Merkle tree model","authors":"Shruthi Gangadharaiah, Purohit Shrinivasacharya","doi":"10.11591/eei.v13i2.6636","DOIUrl":"https://doi.org/10.11591/eei.v13i2.6636","url":null,"abstract":"In this research manuscript, a new protocol is proposed for predicting the available space in the cloud and verifying the security of stored data. The protocol is utilized for learning the available data, and based on this learning, the available storage space is identified, after which the cloud service providers allow for data storage. The Integrity verification separates the private and the public data, which avoids privacy issues. The integration of the private data is done with the help of cloud service providers with respect to the third-party auditing (TPA). Earlier, public key cryptography and bilinear map technologies have been combined by the researchers, but the computation time and costs were high. To secure the integrity of the data storage, the client should execute several computations. Therefore, this research suggests a reliable and effective method called position-aware Merkle tree (PMT), which is implemented for ensuring data integrity. The proposed system uses a PMT that enables the TPA to perform multiple auditing tasks with high efficiency, less computational cost and computation time. Simulation results clearly shows that the developed PMT method consumed 0.00459 milliseconds of computation time, which is limited when compared to the existing models.","PeriodicalId":37619,"journal":{"name":"Bulletin of Electrical Engineering and Informatics","volume":"26 2","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140353832","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Sentiment analysis with hotel customer reviews using FNet 使用 FNet 对酒店客户评论进行情感分析
Q2 Mathematics Pub Date : 2024-04-01 DOI: 10.11591/eei.v13i2.6301
Shovan Bhowmik, Rifat Sadik, Wahiduzzaman Akanda, Juboraj Roy Pavel
Recent research has focused on opinion mining from public sentiments using natural language processing (NLP) and machine learning (ML) techniques. Transformer-based models, such as bidirectional encoder representations from transformers (BERT), excel in extracting semantic information but are resourceintensive. Google’s new research, mixing tokens with fourier transform, also known as FNet, replaced BERT’s attention mechanism with a non-parameterized fourier transform, aiming to reduce training time without compromising performance. This study fine-tuned the FNet model with a publicly available Kaggle hotel review dataset and investigated the performance of this dataset in both FNet and BERT architectures along with conventional machine learning models such as long short-term memory (LSTM) and support vector machine (SVM). Results revealed that FNet significantly reduces the training time by almost 20% and memory utilization by nearly 60% compared to BERT. The highest test accuracy observed in this experiment by FNet was 80.27% which is nearly 97.85% of BERT’s performance with identical parameters.
近期的研究重点是利用自然语言处理(NLP)和机器学习(ML)技术从公众情绪中挖掘观点。基于变换器的模型,如来自变换器的双向编码器表示(BERT),在提取语义信息方面表现出色,但却是资源密集型的。谷歌的新研究 "混合标记与傅立叶变换"(又称 FNet)用非参数化的傅立叶变换取代了 BERT 的注意机制,旨在减少训练时间,同时不影响性能。本研究利用公开的 Kaggle 酒店点评数据集对 FNet 模型进行了微调,并研究了该数据集在 FNet 和 BERT 架构下的性能,以及长短期记忆(LSTM)和支持向量机(SVM)等传统机器学习模型的性能。结果显示,与 BERT 相比,FNet 大幅减少了近 20% 的训练时间和近 60% 的内存使用率。在该实验中,FNet 的最高测试准确率为 80.27%,在参数相同的情况下,接近 BERT 性能的 97.85%。
{"title":"Sentiment analysis with hotel customer reviews using FNet","authors":"Shovan Bhowmik, Rifat Sadik, Wahiduzzaman Akanda, Juboraj Roy Pavel","doi":"10.11591/eei.v13i2.6301","DOIUrl":"https://doi.org/10.11591/eei.v13i2.6301","url":null,"abstract":"Recent research has focused on opinion mining from public sentiments using natural language processing (NLP) and machine learning (ML) techniques. Transformer-based models, such as bidirectional encoder representations from transformers (BERT), excel in extracting semantic information but are resourceintensive. Google’s new research, mixing tokens with fourier transform, also known as FNet, replaced BERT’s attention mechanism with a non-parameterized fourier transform, aiming to reduce training time without compromising performance. This study fine-tuned the FNet model with a publicly available Kaggle hotel review dataset and investigated the performance of this dataset in both FNet and BERT architectures along with conventional machine learning models such as long short-term memory (LSTM) and support vector machine (SVM). Results revealed that FNet significantly reduces the training time by almost 20% and memory utilization by nearly 60% compared to BERT. The highest test accuracy observed in this experiment by FNet was 80.27% which is nearly 97.85% of BERT’s performance with identical parameters.","PeriodicalId":37619,"journal":{"name":"Bulletin of Electrical Engineering and Informatics","volume":"46 3","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140357696","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Secure Euclidean random distribution for patients’ magnetic resonance imaging privacy protection 保护患者磁共振成像隐私的安全欧氏随机分布
Q2 Mathematics Pub Date : 2024-04-01 DOI: 10.11591/eei.v13i2.5989
Ali Jaber Tayh Albderi, Lamjed Ben Said
Patients’ information and images transfer among medical institutes represent a major tool for delivering better healthcare services. However, privacy and security for healthcare information are big challenges in telemedicine. Evidently, even a small change in patients’ information might lead to wrong diagnosis. This paper suggests a new model for hiding patient information inside magnetic resonance imaging (MRI) cover image based on Euclidean distribution. Both least signification bit (LSB) and most signification bit (MSB) techniques are implemented for the physical hiding. A new method is proposed with a very high level of security information based on distributing the secret text in a random way on the cover image. Experimentally, the proposed method has high peak signal to noise ratio (PSNR), structural similarity index metric (SSIM) and reduced mean square error (MSE). Finally, the obtained results are compared with approaches in the last five years and found to be better by increasing the security for patient information for telemedicine.
医疗机构之间的病人信息和图像传输是提供更好医疗服务的重要工具。然而,医疗信息的隐私和安全是远程医疗面临的巨大挑战。显而易见,即使是患者信息的微小变化也可能导致错误诊断。本文提出了一种基于欧几里得分布的在磁共振成像(MRI)覆盖图像中隐藏患者信息的新模型。物理隐藏采用了最小符号位(LSB)和最大符号位(MSB)技术。基于在封面图像上随机分布密文的方法,提出了一种具有极高安全信息级别的新方法。实验表明,所提出的方法具有较高的峰值信噪比(PSNR)、结构相似性指数度量(SSIM)和较低的均方误差(MSE)。最后,将获得的结果与过去五年中的方法进行了比较,发现这些方法在提高远程医疗患者信息的安全性方面更胜一筹。
{"title":"Secure Euclidean random distribution for patients’ magnetic resonance imaging privacy protection","authors":"Ali Jaber Tayh Albderi, Lamjed Ben Said","doi":"10.11591/eei.v13i2.5989","DOIUrl":"https://doi.org/10.11591/eei.v13i2.5989","url":null,"abstract":"Patients’ information and images transfer among medical institutes represent a major tool for delivering better healthcare services. However, privacy and security for healthcare information are big challenges in telemedicine. Evidently, even a small change in patients’ information might lead to wrong diagnosis. This paper suggests a new model for hiding patient information inside magnetic resonance imaging (MRI) cover image based on Euclidean distribution. Both least signification bit (LSB) and most signification bit (MSB) techniques are implemented for the physical hiding. A new method is proposed with a very high level of security information based on distributing the secret text in a random way on the cover image. Experimentally, the proposed method has high peak signal to noise ratio (PSNR), structural similarity index metric (SSIM) and reduced mean square error (MSE). Finally, the obtained results are compared with approaches in the last five years and found to be better by increasing the security for patient information for telemedicine.","PeriodicalId":37619,"journal":{"name":"Bulletin of Electrical Engineering and Informatics","volume":"2 6","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140353045","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Simulation of autonomous navigation of turtlebot robot system based on robot operating system 基于机器人操作系统的海龟机器人自主导航仿真系统
Q2 Mathematics Pub Date : 2024-04-01 DOI: 10.11591/eei.v13i2.6419
M. Ghazal, Murtadha Al-Ghadhanfari, N. Waisi
Complex system science has recently shifted its focus to include modeling, simulation, and behavior control. An effective simulation software built on robot operating system (ROS) is used in robotics development to facilitate the smooth transition between the simulation environment and the hardware testing of control behavior. In this paper, we demonstrate how the simultaneous localization and mapping (SLAM) algorithm can be used to allow a robot to navigate autonomously. The Gazebo is used to simulate the robot, and Rviz is used to visualize the simulated data. The G-mapping package is used to create maps using collected data from a variety of sensors, including laser and odometry. To test and implement autonomous navigation, a Turtlebot was used in a Gazebo-generated simulated environment. In our opinion, additional study on ROS using these important tools might lead to a greater adoption of robotics tests performed, further evaluation automation, and efficient robotic systems.
最近,复杂系统科学的重点已转向建模、仿真和行为控制。建立在机器人操作系统(ROS)基础上的有效仿真软件被用于机器人开发,以促进仿真环境与控制行为硬件测试之间的平稳过渡。在本文中,我们演示了如何利用同步定位和映射(SLAM)算法让机器人自主导航。Gazebo 用于模拟机器人,Rviz 用于可视化模拟数据。G-mapping 软件包用于利用从各种传感器(包括激光和里程计)收集的数据创建地图。为了测试和实现自主导航,我们在 Gazebo 生成的模拟环境中使用了 Turtlebot。我们认为,利用这些重要工具对 ROS 进行更多的研究,可能会使机器人测试得到更广泛的采用,进一步实现评估自动化和高效的机器人系统。
{"title":"Simulation of autonomous navigation of turtlebot robot system based on robot operating system","authors":"M. Ghazal, Murtadha Al-Ghadhanfari, N. Waisi","doi":"10.11591/eei.v13i2.6419","DOIUrl":"https://doi.org/10.11591/eei.v13i2.6419","url":null,"abstract":"Complex system science has recently shifted its focus to include modeling, simulation, and behavior control. An effective simulation software built on robot operating system (ROS) is used in robotics development to facilitate the smooth transition between the simulation environment and the hardware testing of control behavior. In this paper, we demonstrate how the simultaneous localization and mapping (SLAM) algorithm can be used to allow a robot to navigate autonomously. The Gazebo is used to simulate the robot, and Rviz is used to visualize the simulated data. The G-mapping package is used to create maps using collected data from a variety of sensors, including laser and odometry. To test and implement autonomous navigation, a Turtlebot was used in a Gazebo-generated simulated environment. In our opinion, additional study on ROS using these important tools might lead to a greater adoption of robotics tests performed, further evaluation automation, and efficient robotic systems.","PeriodicalId":37619,"journal":{"name":"Bulletin of Electrical Engineering and Informatics","volume":"3 4","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140353336","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A novel women's ovulation prediction through salivary ferning using the box counting and deep learning 利用盒式计数和深度学习通过唾液拈取预测女性排卵的新方法
Q2 Mathematics Pub Date : 2024-04-01 DOI: 10.11591/eei.v13i2.5847
Heri Pratikno, Mohd Zamri Ibrahim, J. Jusak
There are several methods to predict a woman's ovulation time, including using a calendar system, basal body temperature, ovulation prediction kit, and OvuScope. This is the first study to predict the time of ovulation in women by calculating the results of detecting the fractal shape of the full ferning (FF) line pattern in salivary using pixel counting, box counting, and deep learning for computer vision methods. The peak of a woman's ovulation every month in her menstrual cycle occurs when the number of ferning lines is the most numerous or dense, and this condition is called FF. In this study, the computational results based on the visualization of the fractal shape of the salivary ferning line pattern from the pixel-counting method have an accuracy of 80%, while the fractal dimensions achieved by the box-counting are 1.474. On the other hand, using the deep learning image classification, we obtain the highest accuracy of 100% with a precision value of 1.00, recall of 1.00, and F1-score 1.00 on the pre-trained network model ResNet-18. Furthermore, visualization of the ResNet-34 model results in the highest number of patches, i.e., 586 patches (equal to 36,352 pixels), by applying fern-like lines pattern detection with windows size 8x8 pixels.
有几种方法可以预测女性的排卵时间,包括使用日历系统、基础体温、排卵预测套件和OvuScope。这是第一项利用像素计数、方框计数和计算机视觉深度学习方法,通过计算唾液中全分形线(FF)图案的检测结果来预测女性排卵时间的研究。女性每月月经周期的排卵高峰出现在栅格线数量最多或最密集的时候,这种情况被称为 FF。在这项研究中,基于像素计数法的唾液栅格线图案分形可视化计算结果的准确率为 80%,而盒式计数法获得的分形维数为 1.474。另一方面,利用深度学习进行图像分类,我们在预训练网络模型 ResNet-18 上获得了最高的准确率,准确率为 100%,精确度值为 1.00,召回率为 1.00,F1-score 为 1.00。此外,通过应用窗口大小为 8x8 像素的蕨类植物线条模式检测,ResNet-34 模型的可视化结果获得了最高的斑块数量,即 586 个斑块(等于 36,352 像素)。
{"title":"A novel women's ovulation prediction through salivary ferning using the box counting and deep learning","authors":"Heri Pratikno, Mohd Zamri Ibrahim, J. Jusak","doi":"10.11591/eei.v13i2.5847","DOIUrl":"https://doi.org/10.11591/eei.v13i2.5847","url":null,"abstract":"There are several methods to predict a woman's ovulation time, including using a calendar system, basal body temperature, ovulation prediction kit, and OvuScope. This is the first study to predict the time of ovulation in women by calculating the results of detecting the fractal shape of the full ferning (FF) line pattern in salivary using pixel counting, box counting, and deep learning for computer vision methods. The peak of a woman's ovulation every month in her menstrual cycle occurs when the number of ferning lines is the most numerous or dense, and this condition is called FF. In this study, the computational results based on the visualization of the fractal shape of the salivary ferning line pattern from the pixel-counting method have an accuracy of 80%, while the fractal dimensions achieved by the box-counting are 1.474. On the other hand, using the deep learning image classification, we obtain the highest accuracy of 100% with a precision value of 1.00, recall of 1.00, and F1-score 1.00 on the pre-trained network model ResNet-18. Furthermore, visualization of the ResNet-34 model results in the highest number of patches, i.e., 586 patches (equal to 36,352 pixels), by applying fern-like lines pattern detection with windows size 8x8 pixels.","PeriodicalId":37619,"journal":{"name":"Bulletin of Electrical Engineering and Informatics","volume":"3 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140354527","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A novel cost-effective power supply model for industrial appliances based on triangular magnetic shunt transformer design 基于三角形磁性并联变压器设计的新型经济高效工业电器电源模型
Q2 Mathematics Pub Date : 2024-04-01 DOI: 10.11591/eei.v13i2.6459
M. Lahame, H. Outzguinrimt, R. Oumghar, B. Bahani, M. Chraygane
This paper presents a new design of a magnetic shunt transformer for use in industrial microwave generators. The proposed transformer has a triangular shape and offers several advantages over existing transformer designs, including reduced volume and maintenance costs. We provide a detailed analysis of the transformer's dimensions and an equivalent model of the three-phase high voltage power supply system. The results of this study have significant implications for the field of industrial microwave generator design and could lead to the development of more efficient and costeffective systems. The resulting model is comprised of saturable inductors capable of accounting for the non-linear phenomena of saturation. The power supply is simulated using MATLAB/Simulink with a neuro-fuzzy ANFIS approach. The results are compared to experimental validations of a single-phase reference power supply for a magnetron, validating the proposed power supply. Additionally, the simulation results demonstrate the effectiveness of the proposed design, which outperforms existing transformers in terms of volume, energy efficiency and maintenance costs.
本文介绍了一种用于工业微波发生器的新型磁性并联变压器设计。与现有的变压器设计相比,所提出的变压器具有三角形形状和多种优点,包括体积更小、维护成本更低。我们对变压器的尺寸和三相高压供电系统的等效模型进行了详细分析。这项研究的结果对工业微波发生器的设计领域具有重大意义,并可能促使开发出更高效、更具成本效益的系统。由此产生的模型由可饱和电感器组成,能够反映饱和的非线性现象。使用 MATLAB/Simulink 和神经模糊 ANFIS 方法对电源进行了模拟。仿真结果与磁控管单相参考电源的实验验证进行了比较,从而验证了所提出的电源。此外,仿真结果还证明了拟议设计的有效性,在体积、能效和维护成本方面均优于现有变压器。
{"title":"A novel cost-effective power supply model for industrial appliances based on triangular magnetic shunt transformer design","authors":"M. Lahame, H. Outzguinrimt, R. Oumghar, B. Bahani, M. Chraygane","doi":"10.11591/eei.v13i2.6459","DOIUrl":"https://doi.org/10.11591/eei.v13i2.6459","url":null,"abstract":"This paper presents a new design of a magnetic shunt transformer for use in industrial microwave generators. The proposed transformer has a triangular shape and offers several advantages over existing transformer designs, including reduced volume and maintenance costs. We provide a detailed analysis of the transformer's dimensions and an equivalent model of the three-phase high voltage power supply system. The results of this study have significant implications for the field of industrial microwave generator design and could lead to the development of more efficient and costeffective systems. The resulting model is comprised of saturable inductors capable of accounting for the non-linear phenomena of saturation. The power supply is simulated using MATLAB/Simulink with a neuro-fuzzy ANFIS approach. The results are compared to experimental validations of a single-phase reference power supply for a magnetron, validating the proposed power supply. Additionally, the simulation results demonstrate the effectiveness of the proposed design, which outperforms existing transformers in terms of volume, energy efficiency and maintenance costs.","PeriodicalId":37619,"journal":{"name":"Bulletin of Electrical Engineering and Informatics","volume":"40 4","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140356597","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Portable smart attendance system on Jetson Nano 基于 Jetson Nano 的便携式智能考勤系统
Q2 Mathematics Pub Date : 2024-04-01 DOI: 10.11591/eei.v13i2.6061
Edward Yose, Victor Victor, Nico Surantha
The masked face recognition-based attendance management system is an important biometric-based attendance tracking solution, especially in light of the COVID-19 pandemic. Despite the use of various methods and techniques for face detection and recognition, there currently needs to be a system that can accurately recognize individuals while they are wearing a mask. This system has been designed to overcome the challenges of widespread mask use, impacting the effectiveness of traditional face recognition-based attendance systems. The proposed system uses an innovative method that recognizes individuals even while wearing a mask without the need for removal. With its high compatibility and real-time operation, it can be easily integrated into schools and workplaces through an embedded system like the Jetson Nano or conventional computers executing attendance applications. This innovative approach and its compatibility make it a desirable solution for organizations looking to improve their attendance-tracking process. The Experimental results indicates using maximum resources possible the execution time needed on Jetson Nano is 15 to 22 seconds and 14 to 18 seconds respectively and the average frame capture if there are at least one face detected on Jetson Nano is 3-4 frames.
基于面具的人脸识别考勤管理系统是一种重要的生物识别考勤跟踪解决方案,尤其是在 COVID-19 大流行的情况下。尽管使用了各种方法和技术来进行人脸检测和识别,但目前仍需要一种能在佩戴面具时准确识别个人的系统。该系统旨在克服广泛使用面具所带来的挑战,这些挑战影响了基于人脸识别的传统考勤系统的有效性。拟议的系统采用了一种创新方法,即使在佩戴口罩时也能识别个人,无需摘下口罩。该系统具有高度兼容性和实时操作性,可通过 Jetson Nano 等嵌入式系统或执行考勤应用程序的传统计算机轻松集成到学校和工作场所。这种创新方法及其兼容性使其成为希望改进考勤跟踪流程的组织机构的理想解决方案。实验结果表明,在使用尽可能多的资源的情况下,Jetson Nano 上所需的执行时间分别为 15 至 22 秒和 14 至 18 秒,如果在 Jetson Nano 上至少检测到一张人脸,平均帧捕获时间为 3 至 4 帧。
{"title":"Portable smart attendance system on Jetson Nano","authors":"Edward Yose, Victor Victor, Nico Surantha","doi":"10.11591/eei.v13i2.6061","DOIUrl":"https://doi.org/10.11591/eei.v13i2.6061","url":null,"abstract":"The masked face recognition-based attendance management system is an important biometric-based attendance tracking solution, especially in light of the COVID-19 pandemic. Despite the use of various methods and techniques for face detection and recognition, there currently needs to be a system that can accurately recognize individuals while they are wearing a mask. This system has been designed to overcome the challenges of widespread mask use, impacting the effectiveness of traditional face recognition-based attendance systems. The proposed system uses an innovative method that recognizes individuals even while wearing a mask without the need for removal. With its high compatibility and real-time operation, it can be easily integrated into schools and workplaces through an embedded system like the Jetson Nano or conventional computers executing attendance applications. This innovative approach and its compatibility make it a desirable solution for organizations looking to improve their attendance-tracking process. The Experimental results indicates using maximum resources possible the execution time needed on Jetson Nano is 15 to 22 seconds and 14 to 18 seconds respectively and the average frame capture if there are at least one face detected on Jetson Nano is 3-4 frames.","PeriodicalId":37619,"journal":{"name":"Bulletin of Electrical Engineering and Informatics","volume":"14 7","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140356698","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Mathematics for 2D face recognition from real time image data set using deep learning techniques 利用深度学习技术从实时图像数据集中识别二维人脸的数学方法
Q2 Mathematics Pub Date : 2024-04-01 DOI: 10.11591/eei.v13i2.5424
Ambika G. N., Yeresime Suresh
The recognition of human faces poses a complex challenge within the domains of computer vision and artificial intelligence. Emotions play a pivotal role in human interaction, serving as a primary means of communication. This manuscript aims to develop a robust recommendation system capable of identifying individual faces from rasterized images, encompassing features such as eyes, nose, cheeks, lips, forehead, and chin. Human faces exhibit a wide array of emotions, with some emotions, including anger, sadness, happiness, surprise, fear, disgust, and neutrality, being universally recognizable. To achieve this objective, deep learning techniques are leveraged to detect objects containing human faces. Every human face exhibits common characteristics known as Haar features, which are employed to extract feature values from images containing multiple elements. The process is executed through three distinct stages, starting with the initial image and involving calculations. Real-time images from popular social media platforms like Facebook are employed as the dataset for this endeavor. The utilization of deep learning techniques offers superior results, owing to their computational demands and intricate design when compared to classical computer vision methods using OpenCV. The implementation of deep learning is carried out using PyTorch, further enhancing the precision and efficiency of face recognition.
人脸识别是计算机视觉和人工智能领域的一项复杂挑战。情绪在人际交往中起着举足轻重的作用,是沟通的主要手段。本手稿旨在开发一种强大的推荐系统,该系统能够从光栅化图像中识别人脸,包括眼睛、鼻子、脸颊、嘴唇、额头和下巴等特征。人脸表现出各种各样的情绪,其中一些情绪,包括愤怒、悲伤、快乐、惊讶、恐惧、厌恶和中立,是普遍可识别的。为了实现这一目标,深度学习技术被用来检测包含人脸的物体。每张人脸都具有被称为哈尔特征的共同特征,我们利用这些特征从包含多个元素的图像中提取特征值。这一过程分为三个不同的阶段,从初始图像开始,涉及计算。这项工作采用了来自 Facebook 等流行社交媒体平台的实时图像作为数据集。与使用 OpenCV 的经典计算机视觉方法相比,深度学习技术的计算需求和复杂设计使其具有更优越的结果。深度学习使用 PyTorch 实现,进一步提高了人脸识别的精度和效率。
{"title":"Mathematics for 2D face recognition from real time image data set using deep learning techniques","authors":"Ambika G. N., Yeresime Suresh","doi":"10.11591/eei.v13i2.5424","DOIUrl":"https://doi.org/10.11591/eei.v13i2.5424","url":null,"abstract":"The recognition of human faces poses a complex challenge within the domains of computer vision and artificial intelligence. Emotions play a pivotal role in human interaction, serving as a primary means of communication. This manuscript aims to develop a robust recommendation system capable of identifying individual faces from rasterized images, encompassing features such as eyes, nose, cheeks, lips, forehead, and chin. Human faces exhibit a wide array of emotions, with some emotions, including anger, sadness, happiness, surprise, fear, disgust, and neutrality, being universally recognizable. To achieve this objective, deep learning techniques are leveraged to detect objects containing human faces. Every human face exhibits common characteristics known as Haar features, which are employed to extract feature values from images containing multiple elements. The process is executed through three distinct stages, starting with the initial image and involving calculations. Real-time images from popular social media platforms like Facebook are employed as the dataset for this endeavor. The utilization of deep learning techniques offers superior results, owing to their computational demands and intricate design when compared to classical computer vision methods using OpenCV. The implementation of deep learning is carried out using PyTorch, further enhancing the precision and efficiency of face recognition.","PeriodicalId":37619,"journal":{"name":"Bulletin of Electrical Engineering and Informatics","volume":"15 11","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140352591","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Bulletin of Electrical Engineering and Informatics
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1