首页 > 最新文献

2023 IEEE 15th International Symposium on Autonomous Decentralized System (ISADS)最新文献

英文 中文
Collision Avoidance Method for Multirotor Small Unmanned Aircraft Systems in Multilateration Environments 多旋翼小型无人机系统在多方位环境下的避碰方法
Pub Date : 2023-03-15 DOI: 10.1109/ISADS56919.2023.10092170
Gaku Sato, H. Yokoi, D. Toratani, T. Koga
With the increase in the number of small unmanned aircraft systems (sUAS) flights, the risk of collisions between sUAS and manned aircrafts such as helicopters flying at relatively low altitudes is also increasing. To improve safety at the low altitude airspace, we have been developing collision avoidance methods for sUAS. In our previous study, we developed a collision avoidance method that takes advantage of the performance of a multirotor sUAS in a assumed collision between a multirotor sUAS and a helicopter. However, for the sake of simplicity, this previous study did not consider the method of acquiring location information. Therefore, this study conducted collision avoidance simulations in a multilateration (MLAT) environment, which is assumed in helicopter surveillance, to examine how MLAT surveillance characteristics affect avoidance behavior.
随着小型无人机系统(sUAS)飞行数量的增加,在相对较低高度飞行的sUAS与直升机等有人驾驶飞机发生碰撞的风险也在增加。为了提高低空空域的安全性,我们一直在开发用于sUAS的避碰方法。在我们之前的研究中,我们开发了一种避碰方法,该方法利用了多旋翼sUAS在多旋翼sUAS和直升机之间假设碰撞中的性能。但是,为了简单起见,之前的研究没有考虑位置信息的获取方法。因此,本研究在直升机监视中假设的多翼(MLAT)环境中进行了避碰模拟,以研究MLAT监视特性如何影响避碰行为。
{"title":"Collision Avoidance Method for Multirotor Small Unmanned Aircraft Systems in Multilateration Environments","authors":"Gaku Sato, H. Yokoi, D. Toratani, T. Koga","doi":"10.1109/ISADS56919.2023.10092170","DOIUrl":"https://doi.org/10.1109/ISADS56919.2023.10092170","url":null,"abstract":"With the increase in the number of small unmanned aircraft systems (sUAS) flights, the risk of collisions between sUAS and manned aircrafts such as helicopters flying at relatively low altitudes is also increasing. To improve safety at the low altitude airspace, we have been developing collision avoidance methods for sUAS. In our previous study, we developed a collision avoidance method that takes advantage of the performance of a multirotor sUAS in a assumed collision between a multirotor sUAS and a helicopter. However, for the sake of simplicity, this previous study did not consider the method of acquiring location information. Therefore, this study conducted collision avoidance simulations in a multilateration (MLAT) environment, which is assumed in helicopter surveillance, to examine how MLAT surveillance characteristics affect avoidance behavior.","PeriodicalId":412453,"journal":{"name":"2023 IEEE 15th International Symposium on Autonomous Decentralized System (ISADS)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124809586","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Teaching Quantum Machine Learning in Computer Science 计算机科学中的量子机器学习教学
Pub Date : 2023-03-15 DOI: 10.1109/ISADS56919.2023.10092171
G. Luca, Yinong Chen
The field of quantum computing is rapidly growing, with near term applications immediately available for use. The application of quantum computing to machine learning (i.e., quantum machine learning) is similarly growing rapidly. The presence of noisy intermediate-scale quantum (NISQ) era computers is further enabling research in the area. Historically, the barrier to entry of quantum computing has been nearly insurmountable for computer science students, or any other students who lack a strong physics background. However, quantum computing and quantum machine learning are becoming increasingly accessible, regardless of background. The goal of this paper is to present and demonstrate that the field is accessible to computer science students and to provide a sample curriculum. This curriculum can be used in a standalone class or as part of another machine learning class, as the authors have done.
量子计算领域正在迅速发展,短期内可以立即使用。量子计算在机器学习(即量子机器学习)中的应用也同样快速增长。噪声中尺度量子(NISQ)时代计算机的出现进一步推动了该领域的研究。从历史上看,对于计算机科学专业的学生或任何其他缺乏强大物理背景的学生来说,进入量子计算的障碍几乎是不可逾越的。然而,无论背景如何,量子计算和量子机器学习正变得越来越容易获得。本文的目标是展示和证明该领域对计算机科学专业的学生是可访问的,并提供一个示例课程。这个课程可以在一个独立的课程中使用,也可以作为另一个机器学习课程的一部分,正如作者所做的那样。
{"title":"Teaching Quantum Machine Learning in Computer Science","authors":"G. Luca, Yinong Chen","doi":"10.1109/ISADS56919.2023.10092171","DOIUrl":"https://doi.org/10.1109/ISADS56919.2023.10092171","url":null,"abstract":"The field of quantum computing is rapidly growing, with near term applications immediately available for use. The application of quantum computing to machine learning (i.e., quantum machine learning) is similarly growing rapidly. The presence of noisy intermediate-scale quantum (NISQ) era computers is further enabling research in the area. Historically, the barrier to entry of quantum computing has been nearly insurmountable for computer science students, or any other students who lack a strong physics background. However, quantum computing and quantum machine learning are becoming increasingly accessible, regardless of background. The goal of this paper is to present and demonstrate that the field is accessible to computer science students and to provide a sample curriculum. This curriculum can be used in a standalone class or as part of another machine learning class, as the authors have done.","PeriodicalId":412453,"journal":{"name":"2023 IEEE 15th International Symposium on Autonomous Decentralized System (ISADS)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129027524","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A pipeline to collaborative AI models creation between Brazilian governmental institutions 巴西政府机构之间的协作人工智能模型创建管道
Pub Date : 2023-03-15 DOI: 10.1109/ISADS56919.2023.10092030
Gabriel Souza, Mickael Figueredo, Daniel Sabino, N. Cacho
The government has worked to improve technolo-gies to advance criminal investigations. It is very common for Brazilian public institutions to spend resources on systems to improve population security or investigations through artificial intelligence. A central point in this context is the data used by the institutions classified as highly sensitive. This sensitiveness creates a complex barrier to cooperation between governmental institutions from different areas. In this context, this study proposes a federated learning pipeline to encourage artificial intelligence model sharing between government institutions, taking advantage of high-security networks and computational resources from governmental institutions. We leveraged consolidated frameworks such as Docker and TensorFlow to ease the model sharing and training process without working with sensitive data risks. In this work, the performance of 5 different Federated Learning algorithms was tested using three different AI algorithms. In our experiments, the use of Federated Learning in the context of Brazilian governmental institutions proved to create models with performance similar to the standard Centralized Learning techniques in three different federated learning algorithms.
政府一直在努力改进技术,以推进刑事调查。巴西公共机构将资源投入到通过人工智能提高人口安全或调查的系统上是很常见的。这方面的一个中心点是被列为高度敏感的机构所使用的数据。这种敏感性给来自不同领域的政府机构之间的合作造成了复杂的障碍。在此背景下,本研究提出了一个联邦学习管道,利用政府机构的高安全性网络和计算资源,鼓励政府机构之间的人工智能模型共享。我们利用整合框架(如Docker和TensorFlow)来简化模型共享和训练过程,而无需处理敏感数据风险。在这项工作中,使用三种不同的人工智能算法测试了5种不同的联邦学习算法的性能。在我们的实验中,在巴西政府机构的背景下使用联邦学习被证明可以在三种不同的联邦学习算法中创建具有与标准集中式学习技术相似性能的模型。
{"title":"A pipeline to collaborative AI models creation between Brazilian governmental institutions","authors":"Gabriel Souza, Mickael Figueredo, Daniel Sabino, N. Cacho","doi":"10.1109/ISADS56919.2023.10092030","DOIUrl":"https://doi.org/10.1109/ISADS56919.2023.10092030","url":null,"abstract":"The government has worked to improve technolo-gies to advance criminal investigations. It is very common for Brazilian public institutions to spend resources on systems to improve population security or investigations through artificial intelligence. A central point in this context is the data used by the institutions classified as highly sensitive. This sensitiveness creates a complex barrier to cooperation between governmental institutions from different areas. In this context, this study proposes a federated learning pipeline to encourage artificial intelligence model sharing between government institutions, taking advantage of high-security networks and computational resources from governmental institutions. We leveraged consolidated frameworks such as Docker and TensorFlow to ease the model sharing and training process without working with sensitive data risks. In this work, the performance of 5 different Federated Learning algorithms was tested using three different AI algorithms. In our experiments, the use of Federated Learning in the context of Brazilian governmental institutions proved to create models with performance similar to the standard Centralized Learning techniques in three different federated learning algorithms.","PeriodicalId":412453,"journal":{"name":"2023 IEEE 15th International Symposium on Autonomous Decentralized System (ISADS)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114086639","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Computer Vision Approach to Terminus Movement Analysis of Viedma Glacier 维德玛冰川末端运动分析的计算机视觉方法
Pub Date : 2023-03-15 DOI: 10.1109/ISADS56919.2023.10092045
E. Moya-Albor, Armin Schwartzman, J. Brieva, Mauricio Pardo, Hiram Ponce, Rodrigo Chávez-Domínguez
In this paper, an automatic segmentation approach of the Viedma glacier terminus is proposed. The method uses multi-spectral images from the Landsat-5 satellite to determine the area of the glacier through computer vision techniques. The area of the glacier is estimated, and a linear model is fitted, obtaining a correlation of 0.968 between the measured area and a fit linear regression model. On the other hand, a bio-inspired optical flow estimation approach is used to calculate and visualize the displacement of the glacier through time. In addition, an analysis is performed between the temperature variation in the Southern Cone and the decrease of the glacier in the function of time. A linear trend (r2=0.95) shows that the analyzed area of the glacier has decreased by about 1.9% annually in the observation season. It reveals an inverse relationship between the change in the size of the glacier and global warming, showing that if the same conditions remain, the glacier’s zone analyzed in this work would be close to its disappearance in around 70 years, the time lapse in which a global temperature increase of 1.24 oC would be reached.
本文提出了一种自动分割Viedma冰川终点的方法。该方法使用来自Landsat-5卫星的多光谱图像,通过计算机视觉技术确定冰川的面积。估算冰川面积,拟合线性模型,得到实测面积与拟合线性回归模型的相关系数为0.968。另一方面,采用生物启发的光流估计方法来计算和可视化冰川随时间的位移。此外,还分析了南锥的温度变化与冰川的减少随时间的变化关系。线性趋势(r2=0.95)表明,在观测季节,冰川的分析面积每年减少约1.9%。它揭示了冰川大小的变化与全球变暖之间的反比关系,表明如果相同的条件保持不变,本研究分析的冰川带将在70年左右接近其消失,这一时间间隔将达到全球温度升高1.24 oC。
{"title":"A Computer Vision Approach to Terminus Movement Analysis of Viedma Glacier","authors":"E. Moya-Albor, Armin Schwartzman, J. Brieva, Mauricio Pardo, Hiram Ponce, Rodrigo Chávez-Domínguez","doi":"10.1109/ISADS56919.2023.10092045","DOIUrl":"https://doi.org/10.1109/ISADS56919.2023.10092045","url":null,"abstract":"In this paper, an automatic segmentation approach of the Viedma glacier terminus is proposed. The method uses multi-spectral images from the Landsat-5 satellite to determine the area of the glacier through computer vision techniques. The area of the glacier is estimated, and a linear model is fitted, obtaining a correlation of 0.968 between the measured area and a fit linear regression model. On the other hand, a bio-inspired optical flow estimation approach is used to calculate and visualize the displacement of the glacier through time. In addition, an analysis is performed between the temperature variation in the Southern Cone and the decrease of the glacier in the function of time. A linear trend (r2=0.95) shows that the analyzed area of the glacier has decreased by about 1.9% annually in the observation season. It reveals an inverse relationship between the change in the size of the glacier and global warming, showing that if the same conditions remain, the glacier’s zone analyzed in this work would be close to its disappearance in around 70 years, the time lapse in which a global temperature increase of 1.24 oC would be reached.","PeriodicalId":412453,"journal":{"name":"2023 IEEE 15th International Symposium on Autonomous Decentralized System (ISADS)","volume":"167 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115203700","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Development of an Electric Powered Assisted Cycle with a Heart Rate Sensor Control System 带心率传感器控制系统的电动辅助自行车的研制
Pub Date : 2023-03-15 DOI: 10.1109/ISADS56919.2023.10092070
Roberto García Cedillo, D. Martínez-López, Eduardo Martínez Quintana, Andrea Pérez Guerra, J. P. S. H. Moreno, José Manuel Vega Hernández, E. Moya-Albor, Hiram Ponce, J. Brieva
In this paper, we present the development of an intelligent bicycle which will be able to help the user achieve a more efficient exercise routine via the control of a DC motor. This project was developed in several stages, from the approach of the system’s functions to the components that would conform to it in order to achieve a detailed concept that can meet the requirements correctly. The sector of the population that motivated the realization of this project and to whom it is mainly directed are all those who cycle in Mexico City and find their routines inefficient. Through the use of this bicycle, which has a heart rate measurement system, it is possible to monitor it to regulate the intensity of the exercise. It will be made possible by incorporating a motor that is activated as soon as it detects an elevated heart rate, which may mean that the user requires assistance or has to stop the exercise altogether. The results provide evidence that assisting the user does indeed help reduce overexertion.
在本文中,我们介绍了一种智能自行车的开发,它将能够通过直流电机的控制来帮助用户实现更有效的锻炼。该项目分为几个阶段进行开发,从系统功能的方法到与其相符合的组件,以实现能够正确满足需求的详细概念。推动这个项目实现的人群主要是那些在墨西哥城骑自行车的人,他们发现自己的日常工作效率低下。通过使用这种自行车,它有一个心率测量系统,可以监测它来调节运动的强度。它将通过安装一个马达来实现,一旦检测到心率升高,它就会被激活,这可能意味着用户需要帮助或不得不完全停止锻炼。研究结果证明,帮助使用者确实有助于减少过度劳累。
{"title":"Development of an Electric Powered Assisted Cycle with a Heart Rate Sensor Control System","authors":"Roberto García Cedillo, D. Martínez-López, Eduardo Martínez Quintana, Andrea Pérez Guerra, J. P. S. H. Moreno, José Manuel Vega Hernández, E. Moya-Albor, Hiram Ponce, J. Brieva","doi":"10.1109/ISADS56919.2023.10092070","DOIUrl":"https://doi.org/10.1109/ISADS56919.2023.10092070","url":null,"abstract":"In this paper, we present the development of an intelligent bicycle which will be able to help the user achieve a more efficient exercise routine via the control of a DC motor. This project was developed in several stages, from the approach of the system’s functions to the components that would conform to it in order to achieve a detailed concept that can meet the requirements correctly. The sector of the population that motivated the realization of this project and to whom it is mainly directed are all those who cycle in Mexico City and find their routines inefficient. Through the use of this bicycle, which has a heart rate measurement system, it is possible to monitor it to regulate the intensity of the exercise. It will be made possible by incorporating a motor that is activated as soon as it detects an elevated heart rate, which may mean that the user requires assistance or has to stop the exercise altogether. The results provide evidence that assisting the user does indeed help reduce overexertion.","PeriodicalId":412453,"journal":{"name":"2023 IEEE 15th International Symposium on Autonomous Decentralized System (ISADS)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127904557","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Approach to Workload Generation for Cloud Benchmarking: a View from Alibaba Trace 一种基于云基准测试的工作负载生成方法:来自阿里巴巴跟踪的观点
Pub Date : 2023-03-15 DOI: 10.1109/ISADS56919.2023.10092039
Jianyong Zhu, Bin Lu, Xiaoqiang Yu, Jie Xu, Tianyu Wo
Finding performance bottlenecks through bench-marking is one of the driving forces to improve the resource provision efficiency of cloud computing. Although existing benchmarks have been designed to improve the effectiveness in system performance evaluation, the following problems still exist in these benchmarks due to insufficient consideration of the characteristics of jobs in the production environment: (i) lacking of understanding for the details of workloads composition in the production environment, which reduces the authenticity of the job. (ii) the design of workloads submission patterns lacks quantization and reproducibility, which often relies on a random setting. In our benchmarking, multiple workloads are generated by analyzing and fine-grained matching the composition of workloads in the real production, and a design of workloads submission pattern based on LSTM time series prediction is proposed to simulate the real submission behavior. We finally demonstrate the effectiveness of our work by evaluating the impact of different workloads submission patterns on system performance evaluation.
通过基准测试发现性能瓶颈是提高云计算资源供应效率的动力之一。虽然现有的基准测试是为了提高系统性能评估的有效性而设计的,但由于没有充分考虑生产环境中作业的特点,这些基准测试仍然存在以下问题:(1)缺乏对生产环境中工作负载构成细节的了解,降低了作业的真实性。(ii)工作量提交模式的设计缺乏量化和可重复性,往往依赖于随机设置。在我们的基准测试中,通过分析和细粒度匹配实际生产中的工作负载组成来生成多个工作负载,并提出了一种基于LSTM时间序列预测的工作负载提交模式设计来模拟真实的提交行为。最后,我们通过评估不同工作负载提交模式对系统性能评估的影响来证明我们工作的有效性。
{"title":"An Approach to Workload Generation for Cloud Benchmarking: a View from Alibaba Trace","authors":"Jianyong Zhu, Bin Lu, Xiaoqiang Yu, Jie Xu, Tianyu Wo","doi":"10.1109/ISADS56919.2023.10092039","DOIUrl":"https://doi.org/10.1109/ISADS56919.2023.10092039","url":null,"abstract":"Finding performance bottlenecks through bench-marking is one of the driving forces to improve the resource provision efficiency of cloud computing. Although existing benchmarks have been designed to improve the effectiveness in system performance evaluation, the following problems still exist in these benchmarks due to insufficient consideration of the characteristics of jobs in the production environment: (i) lacking of understanding for the details of workloads composition in the production environment, which reduces the authenticity of the job. (ii) the design of workloads submission patterns lacks quantization and reproducibility, which often relies on a random setting. In our benchmarking, multiple workloads are generated by analyzing and fine-grained matching the composition of workloads in the real production, and a design of workloads submission pattern based on LSTM time series prediction is proposed to simulate the real submission behavior. We finally demonstrate the effectiveness of our work by evaluating the impact of different workloads submission patterns on system performance evaluation.","PeriodicalId":412453,"journal":{"name":"2023 IEEE 15th International Symposium on Autonomous Decentralized System (ISADS)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116753370","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fleet in the Loop: An Open Source approach for design and test of resilient vehicle architectures 车队在循环:弹性车辆架构设计和测试的开源方法
Pub Date : 2023-03-15 DOI: 10.1109/ISADS56919.2023.10092108
D. Grimm, Marc Schindewolf, E. Sax
Due to the increasing automation and connectivity of future, software-defined vehicles, the interest in safety and security in this field is growing. In contrast to automated driving functions, which today are only tested and approved for specific operating conditions, the vehicle must be safe and secure in any situation, even if there is a malfunction or intentional manipulation. Resilient software and hardware architectures for vehicles are, therefore, a research topic of growing importance. However, due to the holistic nature of this approach, researching and testing these systems is fraught with challenges. For example, once Machine Learning-based approaches come into play, large amounts of data are required. At the same time, tests of the systems need to take into account the whole vehicle and its ecosystem and be scalable and user-friendly. This work, therefore, presents a new simulation-based method for testing and developing functions for software-defined connected vehicles. The focus is especially on safety and security in combination with cloud services and the consideration of the vehicle fleet. The technologies are presented in detail, relying mainly on the simulator CARLA, the virtualization with Proxmox, and ROS2-based vehicle functions. What differentiates this approach from others is the purely virtual and open-source approach, which increases the availability for others. Results are shown based on early quantitative measures and on outlining two exemplary use cases.
由于未来软件定义车辆的自动化程度和连接性越来越高,人们对该领域的安全性和安全性的兴趣也在不断增长。与目前仅针对特定操作条件进行测试和批准的自动驾驶功能相比,车辆必须在任何情况下都是安全可靠的,即使存在故障或故意操纵。因此,车辆的弹性软件和硬件架构是一个日益重要的研究课题。然而,由于这种方法的整体性,研究和测试这些系统充满了挑战。例如,一旦基于机器学习的方法开始发挥作用,就需要大量的数据。同时,系统的测试需要考虑到整个车辆及其生态系统,并具有可扩展性和用户友好性。因此,这项工作提出了一种新的基于仿真的方法来测试和开发软件定义的联网汽车的功能。重点是与云服务和车队考虑相结合的安全性和安全性。详细介绍了这些技术,主要依靠模拟器CARLA、Proxmox虚拟化和基于ros2的车辆功能。这种方法与其他方法的区别在于纯虚拟和开源方法,这增加了其他方法的可用性。结果是基于早期的定量测量和概述两个示例用例而显示的。
{"title":"Fleet in the Loop: An Open Source approach for design and test of resilient vehicle architectures","authors":"D. Grimm, Marc Schindewolf, E. Sax","doi":"10.1109/ISADS56919.2023.10092108","DOIUrl":"https://doi.org/10.1109/ISADS56919.2023.10092108","url":null,"abstract":"Due to the increasing automation and connectivity of future, software-defined vehicles, the interest in safety and security in this field is growing. In contrast to automated driving functions, which today are only tested and approved for specific operating conditions, the vehicle must be safe and secure in any situation, even if there is a malfunction or intentional manipulation. Resilient software and hardware architectures for vehicles are, therefore, a research topic of growing importance. However, due to the holistic nature of this approach, researching and testing these systems is fraught with challenges. For example, once Machine Learning-based approaches come into play, large amounts of data are required. At the same time, tests of the systems need to take into account the whole vehicle and its ecosystem and be scalable and user-friendly. This work, therefore, presents a new simulation-based method for testing and developing functions for software-defined connected vehicles. The focus is especially on safety and security in combination with cloud services and the consideration of the vehicle fleet. The technologies are presented in detail, relying mainly on the simulator CARLA, the virtualization with Proxmox, and ROS2-based vehicle functions. What differentiates this approach from others is the purely virtual and open-source approach, which increases the availability for others. Results are shown based on early quantitative measures and on outlining two exemplary use cases.","PeriodicalId":412453,"journal":{"name":"2023 IEEE 15th International Symposium on Autonomous Decentralized System (ISADS)","volume":"238 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124253457","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Mining of Potential Relationships based on the Knowledge Graph of Industrial Control Systems 基于工业控制系统知识图谱的潜在关系挖掘
Pub Date : 2023-03-15 DOI: 10.1109/ISADS56919.2023.10092024
X. Zhang, Y. Lai
Industrial Control System(ICS) security is one of the lifebloods of national development. Fully understanding of its vulnerabilities plays an important role in the actual application scenarios. Meanwhile, an attacker may also exploit multiple vulnerabilities to achieve the final malicious purpose, such as the Stuxnet worm. In order to solve the above problems, we construct a Knowledge Graph(KG) of heterogeneous ICSs, and propose a potential relationship mining method (R-HetGNN) based on this graph. The method solves the multi-modality problem in KG aggregation and KG-heterogeneity problem. Besides, we use random walk algorithm to solve the ulti-level neighbor problem. Experimental results on a real-world dataset show that R-HetGNN achieved 83.0% on the F1 score, superior to other knowledge reasoning modules, such as GAT and TransE.
工业控制系统(ICS)安全是国家发展的生命线之一。在实际应用场景中,充分了解其漏洞是非常重要的。同时,攻击者也可能利用多个漏洞来达到最终的恶意目的,例如Stuxnet蠕虫。为了解决上述问题,我们构建了异构集成电路的知识图(KG),并在此基础上提出了一种潜在关系挖掘方法(R-HetGNN)。该方法解决了千克聚集中的多模态问题和千克非均质性问题。此外,我们还使用随机行走算法来解决多层邻居问题。在真实数据集上的实验结果表明,R-HetGNN的F1得分达到83.0%,优于GAT和TransE等其他知识推理模块。
{"title":"Mining of Potential Relationships based on the Knowledge Graph of Industrial Control Systems","authors":"X. Zhang, Y. Lai","doi":"10.1109/ISADS56919.2023.10092024","DOIUrl":"https://doi.org/10.1109/ISADS56919.2023.10092024","url":null,"abstract":"Industrial Control System(ICS) security is one of the lifebloods of national development. Fully understanding of its vulnerabilities plays an important role in the actual application scenarios. Meanwhile, an attacker may also exploit multiple vulnerabilities to achieve the final malicious purpose, such as the Stuxnet worm. In order to solve the above problems, we construct a Knowledge Graph(KG) of heterogeneous ICSs, and propose a potential relationship mining method (R-HetGNN) based on this graph. The method solves the multi-modality problem in KG aggregation and KG-heterogeneity problem. Besides, we use random walk algorithm to solve the ulti-level neighbor problem. Experimental results on a real-world dataset show that R-HetGNN achieved 83.0% on the F1 score, superior to other knowledge reasoning modules, such as GAT and TransE.","PeriodicalId":412453,"journal":{"name":"2023 IEEE 15th International Symposium on Autonomous Decentralized System (ISADS)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134008335","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Real Time Deep Learning Algorithm for Counting Weed’s Growth Stages 计算杂草生长阶段的实时深度学习算法
Pub Date : 2023-03-15 DOI: 10.1109/ISADS56919.2023.10092053
Abeer M. Almalky, Khaled R. Ahmed
Since the number of people worldwide is anticipated to reach 9 billion people by 2050, the agriculture production needs to be increased up to 70% to manage the anticipated increasing of human demand. However, weeds are one of the most harmful factors that negatively impact the crops production, quality, and cause economical loses. Accordingly, automating the weed detection, classification, and counting of weeds per their growth stages will help farmers to choose the appropriate weeds’ controlling techniques. In this paper, UAV was used for collecting a dataset, which consists of four weed (Consolida Regalis) growth stages. Additionally, a deep learning model (YOLOv5) was developed and trained for detecting weed, classifying weed’s growth stages, and counting the number of weeds occurrences in each part of the field. The results report that the best precision (82.7%) is generated by the Yolov5-Large model in detecting and classifying the weed’s growth stages. According to the best performance in terms of recall, Yolov5-sma11 model has the best recall of 79.4%. For counting the instances of weeds per the four growth stages in real-time, Yolov5-sma11 model showes counting time of 0.033 millisecond per frame.
由于到2050年全球人口预计将达到90亿,因此农业生产需要增加到70%才能满足预期的人类需求增长。然而,杂草是影响农作物产量、品质和造成经济损失的最有害因素之一。因此,在每个生长阶段对杂草进行自动检测、分类和计数,将有助于农民选择合适的杂草控制技术。本文利用无人机采集了一个数据集,该数据集由四个杂草生长阶段组成。此外,开发并训练了一个深度学习模型(YOLOv5),用于检测杂草,对杂草的生长阶段进行分类,并计算田间每个部分的杂草发生数量。结果表明,Yolov5-Large模型对杂草生长阶段的检测和分类精度最高,达到82.7%。从召回率方面来看,Yolov5-sma11型号召回率最高,为79.4%。Yolov5-sma11模型对四个生长阶段的杂草实例进行实时计数,显示计数时间为0.033毫秒/帧。
{"title":"Real Time Deep Learning Algorithm for Counting Weed’s Growth Stages","authors":"Abeer M. Almalky, Khaled R. Ahmed","doi":"10.1109/ISADS56919.2023.10092053","DOIUrl":"https://doi.org/10.1109/ISADS56919.2023.10092053","url":null,"abstract":"Since the number of people worldwide is anticipated to reach 9 billion people by 2050, the agriculture production needs to be increased up to 70% to manage the anticipated increasing of human demand. However, weeds are one of the most harmful factors that negatively impact the crops production, quality, and cause economical loses. Accordingly, automating the weed detection, classification, and counting of weeds per their growth stages will help farmers to choose the appropriate weeds’ controlling techniques. In this paper, UAV was used for collecting a dataset, which consists of four weed (Consolida Regalis) growth stages. Additionally, a deep learning model (YOLOv5) was developed and trained for detecting weed, classifying weed’s growth stages, and counting the number of weeds occurrences in each part of the field. The results report that the best precision (82.7%) is generated by the Yolov5-Large model in detecting and classifying the weed’s growth stages. According to the best performance in terms of recall, Yolov5-sma11 model has the best recall of 79.4%. For counting the instances of weeds per the four growth stages in real-time, Yolov5-sma11 model showes counting time of 0.033 millisecond per frame.","PeriodicalId":412453,"journal":{"name":"2023 IEEE 15th International Symposium on Autonomous Decentralized System (ISADS)","volume":"335 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122917736","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Why Decentralize Deep Learning? 为什么要去中心化深度学习?
Pub Date : 2023-03-15 DOI: 10.1109/ISADS56919.2023.10091996
Steven A. Wright
Deep learning, big data, IoT and blockchain are individually very important research topics of today’s technology, and their combination has the potential to generate additional synergy. Such synergy could enable decentralized and intelligent automated applications to achieve safety, security and optimize performance and economy. Deep learning, big data, IoT and blockchain all rely on infrastructure capabilities in computing and communications that are increasingly decentralized. Edge computing deployments and architectures are commencing with 5G and expected to accelerate in 6G. Existing application domains like healthcare and finance are starting to explore the integration of these technologies. Newly emerging application areas such as the metaverse may well require native support of decentralized deep learning to achieve their potential. But the path of new technology development is never smooth. New challenges have been identified and additional architectural frameworks have been developed to overcome some of these issues. Decentralizing deep learning enables increased scale for AI implementations, but also enables improvements in privacy and trustworthiness. The plethora of literature emerging on decentralized deep learning prompts the need for rationale criteria to support design decisions for implementation to utilize decentralized deep learning
深度学习、大数据、物联网和区块链都是当今技术中非常重要的研究课题,它们的结合有可能产生额外的协同效应。这种协同作用可以使分散和智能的自动化应用程序实现安全,保障并优化性能和经济性。深度学习、大数据、物联网和区块链都依赖于计算和通信领域日益分散的基础设施能力。边缘计算部署和架构从5G开始,预计将在6G加速。医疗保健和金融等现有应用领域正开始探索这些技术的集成。新兴的应用领域,如元宇宙,很可能需要去中心化深度学习的原生支持来实现其潜力。但新技术的发展之路从来都不是一帆风顺的。已经确定了新的挑战,并且已经开发了额外的体系结构框架来克服其中的一些问题。去中心化深度学习可以增加人工智能实施的规模,但也可以改善隐私和可信度。关于去中心化深度学习的大量文献促使人们需要基本的标准来支持设计决策,以实现利用去中心化深度学习
{"title":"Why Decentralize Deep Learning?","authors":"Steven A. Wright","doi":"10.1109/ISADS56919.2023.10091996","DOIUrl":"https://doi.org/10.1109/ISADS56919.2023.10091996","url":null,"abstract":"Deep learning, big data, IoT and blockchain are individually very important research topics of today’s technology, and their combination has the potential to generate additional synergy. Such synergy could enable decentralized and intelligent automated applications to achieve safety, security and optimize performance and economy. Deep learning, big data, IoT and blockchain all rely on infrastructure capabilities in computing and communications that are increasingly decentralized. Edge computing deployments and architectures are commencing with 5G and expected to accelerate in 6G. Existing application domains like healthcare and finance are starting to explore the integration of these technologies. Newly emerging application areas such as the metaverse may well require native support of decentralized deep learning to achieve their potential. But the path of new technology development is never smooth. New challenges have been identified and additional architectural frameworks have been developed to overcome some of these issues. Decentralizing deep learning enables increased scale for AI implementations, but also enables improvements in privacy and trustworthiness. The plethora of literature emerging on decentralized deep learning prompts the need for rationale criteria to support design decisions for implementation to utilize decentralized deep learning","PeriodicalId":412453,"journal":{"name":"2023 IEEE 15th International Symposium on Autonomous Decentralized System (ISADS)","volume":"3 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117319309","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2023 IEEE 15th International Symposium on Autonomous Decentralized System (ISADS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1