首页 > 最新文献

2022 XXVIII International Conference on Information, Communication and Automation Technologies (ICAT)最新文献

英文 中文
Quantum Channel Characteristics from the Point of View of Stability 从稳定性的角度看量子信道特性
Filip Lauterbach, Patrik Burdiak, J. Rozhon, E. Dervisevic, Martina Slívová, Matej Plakalovic, M. Mehic, M. Voznák
The article presents a series of measurements conducted on the fully-operated Quantum Key Distribution system. These measurements primarily focus on the Quantum Bit Error Rate (QBER), which is the most important parameter of the quantum channel. This parameter was observed and measured for 16 days under the quantum channel’s operating conditions to determine any correlations between the QBER and other quantum link parameters, such as secret key rate. A thorough statistical analysis of the measured data was performed as a part of this investigation and is presented in the paper.
本文介绍了在全操作量子密钥分发系统上进行的一系列测量。这些测量主要集中在量子误码率(QBER)上,这是量子信道最重要的参数。在量子信道的运行条件下,对该参数进行了16天的观察和测量,以确定QBER与其他量子链路参数(如密钥速率)之间的相关性。对测量数据进行了彻底的统计分析,作为调查的一部分,并在本文中提出。
{"title":"Quantum Channel Characteristics from the Point of View of Stability","authors":"Filip Lauterbach, Patrik Burdiak, J. Rozhon, E. Dervisevic, Martina Slívová, Matej Plakalovic, M. Mehic, M. Voznák","doi":"10.1109/ICAT54566.2022.9811208","DOIUrl":"https://doi.org/10.1109/ICAT54566.2022.9811208","url":null,"abstract":"The article presents a series of measurements conducted on the fully-operated Quantum Key Distribution system. These measurements primarily focus on the Quantum Bit Error Rate (QBER), which is the most important parameter of the quantum channel. This parameter was observed and measured for 16 days under the quantum channel’s operating conditions to determine any correlations between the QBER and other quantum link parameters, such as secret key rate. A thorough statistical analysis of the measured data was performed as a part of this investigation and is presented in the paper.","PeriodicalId":414786,"journal":{"name":"2022 XXVIII International Conference on Information, Communication and Automation Technologies (ICAT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128657553","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Behavioral modeling of knitted shape memory membrane 针织形状记忆膜的行为建模
Ahmed Amine Chafik, J. Gaber, S. Tayane, M. Ennaji
Programmable matter is a system of elements (e.g., smart matters, modular robots, …) that is programmed via user input or autonomous sensing to form a certain shape, by altering its physical characteristics. This paper presents a programmable and reusable device to be used, for example in 4D prototyping and Haptics, using the shapeshifting abilities of smart materials such as shape memory alloys to exhibit a certain behavior controlled by stimulus (heat energy). More precisely, these materials can be programmed and integrated into devices or systems to function according to suitable configurations and conditions (e.g., shape making), via stimuli control as programming means, and wherein the behavior can be modelized using appropriate equations. The programmable device presented in this paper is a shape memory membrane, that makes 3D forms out of a knitted architecture to match a target model, using the shape memory effect. Simulation results using COMSOL are presented and analyzed to model the thermo-mechanical behavior and establish the device’s programming model.
可编程物质是一种元素系统(例如,智能物质,模块化机器人等),通过用户输入或自主感知来编程,通过改变其物理特性来形成一定的形状。本文提出了一种可编程和可重复使用的设备,例如在4D原型和触觉中,利用形状记忆合金等智能材料的变形能力,在刺激(热能)的控制下表现出某种行为。更准确地说,这些材料可以被编程并集成到设备或系统中,以根据合适的配置和条件(例如,形状制作),通过刺激控制作为编程手段,其中行为可以使用适当的方程进行建模。本文提出的可编程器件是一种形状记忆膜,它利用形状记忆效应,从编织结构中生成与目标模型匹配的三维形状。利用COMSOL软件对仿真结果进行了分析,建立了器件的热力学行为模型,并建立了器件的编程模型。
{"title":"Behavioral modeling of knitted shape memory membrane","authors":"Ahmed Amine Chafik, J. Gaber, S. Tayane, M. Ennaji","doi":"10.1109/ICAT54566.2022.9811236","DOIUrl":"https://doi.org/10.1109/ICAT54566.2022.9811236","url":null,"abstract":"Programmable matter is a system of elements (e.g., smart matters, modular robots, …) that is programmed via user input or autonomous sensing to form a certain shape, by altering its physical characteristics. This paper presents a programmable and reusable device to be used, for example in 4D prototyping and Haptics, using the shapeshifting abilities of smart materials such as shape memory alloys to exhibit a certain behavior controlled by stimulus (heat energy). More precisely, these materials can be programmed and integrated into devices or systems to function according to suitable configurations and conditions (e.g., shape making), via stimuli control as programming means, and wherein the behavior can be modelized using appropriate equations. The programmable device presented in this paper is a shape memory membrane, that makes 3D forms out of a knitted architecture to match a target model, using the shape memory effect. Simulation results using COMSOL are presented and analyzed to model the thermo-mechanical behavior and establish the device’s programming model.","PeriodicalId":414786,"journal":{"name":"2022 XXVIII International Conference on Information, Communication and Automation Technologies (ICAT)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131458263","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Experimental Determination of Grounding System Impulse Impedance under High Frequency Electromagnetic Interferences 高频电磁干扰下接地系统冲击阻抗的实验测定
Nedis Dautbašić, A. Mujezinović, I. Turkovic, Maja Muftić Dedović, Ajdin Alihodžić
In this paper approach for the experimental determination of the grounding system impulse impedance under the presence of the high-frequency electromagnetic interference is presented. The considered approach is based on the application of the discrete wavelet transform on the measured signals. Validation of the considered approach has been conducted in several experiments using a vertical grounding electrode. The experimental investigation has been performed using different impulse current peak values and different front rise times. On all measured current and voltage waveforms, high-frequency interferences were registered.
本文提出了高频电磁干扰下接地系统冲击阻抗的实验测定方法。所考虑的方法是基于对测量信号进行离散小波变换。在使用垂直接地电极的几个实验中,对所考虑的方法进行了验证。采用不同的脉冲电流峰值和不同的前上升时间进行了实验研究。在所有测量的电流和电压波形上,记录了高频干扰。
{"title":"Experimental Determination of Grounding System Impulse Impedance under High Frequency Electromagnetic Interferences","authors":"Nedis Dautbašić, A. Mujezinović, I. Turkovic, Maja Muftić Dedović, Ajdin Alihodžić","doi":"10.1109/ICAT54566.2022.9811181","DOIUrl":"https://doi.org/10.1109/ICAT54566.2022.9811181","url":null,"abstract":"In this paper approach for the experimental determination of the grounding system impulse impedance under the presence of the high-frequency electromagnetic interference is presented. The considered approach is based on the application of the discrete wavelet transform on the measured signals. Validation of the considered approach has been conducted in several experiments using a vertical grounding electrode. The experimental investigation has been performed using different impulse current peak values and different front rise times. On all measured current and voltage waveforms, high-frequency interferences were registered.","PeriodicalId":414786,"journal":{"name":"2022 XXVIII International Conference on Information, Communication and Automation Technologies (ICAT)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124303673","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Methodology to Develop Extended Reality Applications for Exhibition Spaces in Museums 博物馆展览空间扩展现实应用的开发方法
Dayana Agudo, Christian Barreto Paredes, Otto Parra Gonzalez, Maria Fernanda Granda
Web 2.0 brought the development of social networks and new elements of interaction that were incorporated into Web sites and devices that supported them. In the field of museums, the emergence of Web 2.0 and Museum 2.0 has made it possible to improve access to information regarding art collections. Due to the COVID-19 pandemic, museums have opted for the introduction of technology permitting virtual access to their collections. However, many applications were developed using traditional development process without considering a methodology dedicated to extended reality applications. This paper describes a methodology for the implementation of extended reality applications to exhibition spaces in museums. Using a quasi-experiment, we evaluate the data collection stage of the proposed methodology to develop an extended reality application to visit exhibition spaces in a museum. Results show that the proposed methodology helps to the software engineers/designers in the development process of extended reality applications.
Web 2.0带来了社交网络的发展和新的交互元素,这些元素被整合到Web站点和支持它们的设备中。在博物馆领域,Web 2.0和Museum 2.0的出现使人们能够更好地获取有关艺术收藏的信息。由于COVID-19大流行,博物馆选择引入允许虚拟访问其藏品的技术。然而,许多应用程序是使用传统的开发过程开发的,没有考虑专用于扩展现实应用程序的方法。本文描述了一种将扩展现实应用于博物馆展览空间的方法。通过准实验,我们评估了所提出方法的数据收集阶段,以开发一个扩展现实应用程序来参观博物馆的展览空间。结果表明,所提出的方法对软件工程师/设计人员在扩展现实应用程序的开发过程中有所帮助。
{"title":"A Methodology to Develop Extended Reality Applications for Exhibition Spaces in Museums","authors":"Dayana Agudo, Christian Barreto Paredes, Otto Parra Gonzalez, Maria Fernanda Granda","doi":"10.1109/ICAT54566.2022.9811205","DOIUrl":"https://doi.org/10.1109/ICAT54566.2022.9811205","url":null,"abstract":"Web 2.0 brought the development of social networks and new elements of interaction that were incorporated into Web sites and devices that supported them. In the field of museums, the emergence of Web 2.0 and Museum 2.0 has made it possible to improve access to information regarding art collections. Due to the COVID-19 pandemic, museums have opted for the introduction of technology permitting virtual access to their collections. However, many applications were developed using traditional development process without considering a methodology dedicated to extended reality applications. This paper describes a methodology for the implementation of extended reality applications to exhibition spaces in museums. Using a quasi-experiment, we evaluate the data collection stage of the proposed methodology to develop an extended reality application to visit exhibition spaces in a museum. Results show that the proposed methodology helps to the software engineers/designers in the development process of extended reality applications.","PeriodicalId":414786,"journal":{"name":"2022 XXVIII International Conference on Information, Communication and Automation Technologies (ICAT)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114662817","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
High-Speed FPGA-Based Ethernet Traffic Generator 基于fpga的高速以太网流量发生器
Matej Plakalovic, Enio Kaljic, M. Mehic
New generation networks are facing ever greater demands. When testing new network devices that must process packets at extremely high rates, it is essential to test their functionality and desired performance under maximum traffic load. As a result, in order to test the hardware, a traffic generator is required. This paper proposes an affordable and extensible high-speed FPGA-based Ethernet traffic generator. The proposed solution is able of fully utilizing a 40GbE link, with the possibility of manipulating traffic characteristics at the level of an individual packet. Although intended to run on the DE10-Pro system, the proposed design is portable to other FPGA boards with minimal development effort and changes.
新一代网络面临着越来越大的需求。在测试必须以极高速率处理数据包的新网络设备时,必须在最大流量负载下测试其功能和所需性能。因此,为了测试硬件,需要一个流量生成器。提出了一种价格合理、可扩展的基于fpga的高速以太网流量发生器。所提出的解决方案能够充分利用40GbE链路,并具有在单个数据包级别操纵流量特性的可能性。虽然打算在DE10-Pro系统上运行,但提议的设计可移植到其他FPGA板上,只需最少的开发工作和更改。
{"title":"High-Speed FPGA-Based Ethernet Traffic Generator","authors":"Matej Plakalovic, Enio Kaljic, M. Mehic","doi":"10.1109/ICAT54566.2022.9811210","DOIUrl":"https://doi.org/10.1109/ICAT54566.2022.9811210","url":null,"abstract":"New generation networks are facing ever greater demands. When testing new network devices that must process packets at extremely high rates, it is essential to test their functionality and desired performance under maximum traffic load. As a result, in order to test the hardware, a traffic generator is required. This paper proposes an affordable and extensible high-speed FPGA-based Ethernet traffic generator. The proposed solution is able of fully utilizing a 40GbE link, with the possibility of manipulating traffic characteristics at the level of an individual packet. Although intended to run on the DE10-Pro system, the proposed design is portable to other FPGA boards with minimal development effort and changes.","PeriodicalId":414786,"journal":{"name":"2022 XXVIII International Conference on Information, Communication and Automation Technologies (ICAT)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130862611","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Bloom filter based acceleration scheme for flow table lookup in SDN switches 基于布隆滤波的SDN交换机流表查找加速方案
Enio Kaljic, A. Maric, Pamela Njemcevic
Flow table lookup is a well-known bottleneck in software-defined network switches. Associative lookup is the fastest but most costly method. On the other hand, an approximate flow classification based on Bloom filters has an outstanding cost-benefit ratio but comes with a downside of false-positive results. Therefore, we propose a new flow table lookup scheme based on Bloom filters and RAM, which offers a good compromise between cost and performance. We solve the problem of false positives of primary Bloom filters by verifying the results and, if necessary, by linearly searching the contents of secondary RAM. Also, we provide a practical implementation in the FPGA-based SDN switch and experimentally show that the proposed solution can achieve better performance than the classic linear search at the low cost typical of Bloom filters.
流表查找是软件定义网络交换机中一个众所周知的瓶颈。关联查找是最快但代价最高的方法。另一方面,基于布隆过滤器的近似流分类具有突出的成本效益比,但也有假阳性结果的缺点。因此,我们提出了一种新的基于Bloom过滤器和RAM的流表查找方案,该方案在成本和性能之间提供了很好的折衷。我们通过验证结果,并在必要时通过线性搜索辅助RAM的内容来解决主Bloom过滤器的误报问题。此外,我们在基于fpga的SDN交换机中提供了一个实际实现,实验表明,所提出的解决方案可以在低成本的典型布隆滤波器下获得比经典线性搜索更好的性能。
{"title":"Bloom filter based acceleration scheme for flow table lookup in SDN switches","authors":"Enio Kaljic, A. Maric, Pamela Njemcevic","doi":"10.1109/ICAT54566.2022.9811185","DOIUrl":"https://doi.org/10.1109/ICAT54566.2022.9811185","url":null,"abstract":"Flow table lookup is a well-known bottleneck in software-defined network switches. Associative lookup is the fastest but most costly method. On the other hand, an approximate flow classification based on Bloom filters has an outstanding cost-benefit ratio but comes with a downside of false-positive results. Therefore, we propose a new flow table lookup scheme based on Bloom filters and RAM, which offers a good compromise between cost and performance. We solve the problem of false positives of primary Bloom filters by verifying the results and, if necessary, by linearly searching the contents of secondary RAM. Also, we provide a practical implementation in the FPGA-based SDN switch and experimentally show that the proposed solution can achieve better performance than the classic linear search at the low cost typical of Bloom filters.","PeriodicalId":414786,"journal":{"name":"2022 XXVIII International Conference on Information, Communication and Automation Technologies (ICAT)","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125567470","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
PMU Spoof Detection via Image Classification Methodology against Repeated Value Attacks by using Deep Learning 基于图像分类方法的PMU欺骗检测,利用深度学习对抗重复价值攻击
Alvin Huseinović, Yusuf Korkmaz, Halil Bisgin, S. Mrdović, S. Uludag
Various devices and monitoring systems have been developed and deployed in order to monitor the power grid. Indeed, several real-world cyberattacks on power grid systems have been publicly reported. For the transmission and distribution, Phasor Measurement Units (PMUs) constitute the main sensing equipment of the overall wide area monitoring and situational awareness systems by collecting high-resolution data and sending them to Phasor Data Concentrators (PDCs). In this paper, we consider data spoofing attacks against PMU networks. The data between PMUs and PDC(s) are sent through the legacy networks, which are subject to many attack scenarios under with no, or inadequate, countermeasures in protocols, such as IEEE 37.118-2. We consider one potential attack, where an adversary may simply keep injecting a repeated measurement through a compromised PMU to disrupt the monitoring system. This attack is referred to as a Repeated Last Value (RLV) attack. We develop and evaluate countermeasures against RLV attacks using a 2D Convolutional Neural Network (CNN)-based approach, which operates in frames for each second mimicking images, in order to avoid the computational overhead of the classical sample-based classification algorithms, such as SVM. Further, we take this frame-based approach and use it with Support Vector Machine (SVM) for performance evaluation. Our preliminary results show that frame-based CNN as well as SVM provide promising results for RLV attacks while the efficacy of CNN over SVM frame becomes more pronounced as the attack intensity increases.
为了监测电网,已经开发和部署了各种设备和监测系统。事实上,公开报道了几起针对电网系统的真实网络攻击。对于传输和分配,相量测量单元(pmu)通过收集高分辨率数据并将其发送到相量数据集中器(PDCs),构成了整个广域监测和态势感知系统的主要传感设备。在本文中,我们考虑针对PMU网络的数据欺骗攻击。pmu和配电柜之间的数据是通过传统的网络发送的,而传统的网络在协议(如IEEE 37.118-2)没有应对措施或应对措施不足的情况下,会受到许多攻击场景的影响。我们考虑一种潜在的攻击,攻击者可以简单地通过受损的PMU注入重复的测量来破坏监控系统。这种攻击被称为重复最后值(RLV)攻击。我们使用基于2D卷积神经网络(CNN)的方法开发和评估针对RLV攻击的对策,该方法以每秒帧的方式模拟图像,以避免经典的基于样本的分类算法(如SVM)的计算开销。此外,我们采用这种基于框架的方法,并将其与支持向量机(SVM)一起用于性能评估。我们的初步结果表明,基于帧的CNN和SVM对RLV攻击都有很好的效果,并且随着攻击强度的增加,CNN在SVM帧上的效果更加明显。
{"title":"PMU Spoof Detection via Image Classification Methodology against Repeated Value Attacks by using Deep Learning","authors":"Alvin Huseinović, Yusuf Korkmaz, Halil Bisgin, S. Mrdović, S. Uludag","doi":"10.1109/ICAT54566.2022.9811128","DOIUrl":"https://doi.org/10.1109/ICAT54566.2022.9811128","url":null,"abstract":"Various devices and monitoring systems have been developed and deployed in order to monitor the power grid. Indeed, several real-world cyberattacks on power grid systems have been publicly reported. For the transmission and distribution, Phasor Measurement Units (PMUs) constitute the main sensing equipment of the overall wide area monitoring and situational awareness systems by collecting high-resolution data and sending them to Phasor Data Concentrators (PDCs). In this paper, we consider data spoofing attacks against PMU networks. The data between PMUs and PDC(s) are sent through the legacy networks, which are subject to many attack scenarios under with no, or inadequate, countermeasures in protocols, such as IEEE 37.118-2. We consider one potential attack, where an adversary may simply keep injecting a repeated measurement through a compromised PMU to disrupt the monitoring system. This attack is referred to as a Repeated Last Value (RLV) attack. We develop and evaluate countermeasures against RLV attacks using a 2D Convolutional Neural Network (CNN)-based approach, which operates in frames for each second mimicking images, in order to avoid the computational overhead of the classical sample-based classification algorithms, such as SVM. Further, we take this frame-based approach and use it with Support Vector Machine (SVM) for performance evaluation. Our preliminary results show that frame-based CNN as well as SVM provide promising results for RLV attacks while the efficacy of CNN over SVM frame becomes more pronounced as the attack intensity increases.","PeriodicalId":414786,"journal":{"name":"2022 XXVIII International Conference on Information, Communication and Automation Technologies (ICAT)","volume":"193 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123069277","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Multilevel image thresholding based on Rao algorithms and Kapur’s Entropy 基于Rao算法和Kapur熵的多级图像阈值分割
E. Turajlić, E. Buza, Amila Akagic
In the fields of computer vision and digital image processing, image segmentation denotes a process whereby an image is segmented into multiple regions. Image segmentation based on multilevel thresholding has received significant attention in recent literature. In this paper, a multilevel thresholding approach based on three different Rao algorithms and Kapur’s entropy is investigated. The performance of the considered thresholding methods is evaluated on a dataset of 10 standard benchmark images using the mean of objective function values, the standard deviation of objective function values, and the best objective function value obtained over a fixed number of independent runs. The experimental results demonstrate the effectiveness of the multilevel thresholding approach based on Rao algorithms and Kapur’s entropy.
在计算机视觉和数字图像处理领域,图像分割是指将图像分割成多个区域的过程。基于多级阈值分割的图像分割方法在近年来得到了广泛的关注。本文研究了一种基于三种不同的Rao算法和Kapur熵的多级阈值分割方法。在10个标准基准图像的数据集上,使用目标函数值的平均值、目标函数值的标准差以及在固定次数的独立运行中获得的最佳目标函数值来评估所考虑的阈值分割方法的性能。实验结果证明了基于Rao算法和Kapur熵的多级阈值方法的有效性。
{"title":"Multilevel image thresholding based on Rao algorithms and Kapur’s Entropy","authors":"E. Turajlić, E. Buza, Amila Akagic","doi":"10.1109/ICAT54566.2022.9811171","DOIUrl":"https://doi.org/10.1109/ICAT54566.2022.9811171","url":null,"abstract":"In the fields of computer vision and digital image processing, image segmentation denotes a process whereby an image is segmented into multiple regions. Image segmentation based on multilevel thresholding has received significant attention in recent literature. In this paper, a multilevel thresholding approach based on three different Rao algorithms and Kapur’s entropy is investigated. The performance of the considered thresholding methods is evaluated on a dataset of 10 standard benchmark images using the mean of objective function values, the standard deviation of objective function values, and the best objective function value obtained over a fixed number of independent runs. The experimental results demonstrate the effectiveness of the multilevel thresholding approach based on Rao algorithms and Kapur’s entropy.","PeriodicalId":414786,"journal":{"name":"2022 XXVIII International Conference on Information, Communication and Automation Technologies (ICAT)","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121137720","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Deep Reinforcement Learning in Smart Grid: Progress and Prospects 智能电网中的深度强化学习:进展与展望
Amila Akagic, I. Džafić
The combination of reinforcement learning and deep learning has shown some remarkable results in many scientific fields. Deep reinforcement learning algorithms are particularly good at understanding and modeling adaptive decision-making in dynamic environments. In recent years, this concept has been successfully applied to smart grids. In this paper, we provide a brief introduction to the concepts of reinforcement and deep reinforcement learning to the power system engineers and present research progress and prospects in the field. Additionally, we identify smart grid engineering domains that need extensive pattern-based modeling as being particularly suitable for deep reinforcement learning.
强化学习和深度学习的结合在许多科学领域已经显示出一些显著的成果。深度强化学习算法特别擅长理解和建模动态环境中的自适应决策。近年来,这一概念已成功应用于智能电网。本文向电力系统工程师简要介绍了强化和深度强化学习的概念,并介绍了该领域的研究进展和展望。此外,我们确定需要广泛的基于模式的建模的智能电网工程领域特别适合深度强化学习。
{"title":"Deep Reinforcement Learning in Smart Grid: Progress and Prospects","authors":"Amila Akagic, I. Džafić","doi":"10.1109/ICAT54566.2022.9811131","DOIUrl":"https://doi.org/10.1109/ICAT54566.2022.9811131","url":null,"abstract":"The combination of reinforcement learning and deep learning has shown some remarkable results in many scientific fields. Deep reinforcement learning algorithms are particularly good at understanding and modeling adaptive decision-making in dynamic environments. In recent years, this concept has been successfully applied to smart grids. In this paper, we provide a brief introduction to the concepts of reinforcement and deep reinforcement learning to the power system engineers and present research progress and prospects in the field. Additionally, we identify smart grid engineering domains that need extensive pattern-based modeling as being particularly suitable for deep reinforcement learning.","PeriodicalId":414786,"journal":{"name":"2022 XXVIII International Conference on Information, Communication and Automation Technologies (ICAT)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121060493","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Computer Vision with 3D Point Cloud Data: Methods, Datasets and Challenges 计算机视觉与3D点云数据:方法,数据集和挑战
Amila Akagic, Senka Krivic, Harun Dizdar, J. Velagić
The scientific discipline of Computer Vision (CV) is a fast developing branch of Machine Learning (ML). It addresses various tasks important for robotics, medicine, autonomous driving, surveillance, security or scene understanding. The development of sensor technologies enabled wide usage of 3D sensors, and therefore, it increased the interest of the CV research community in creating methods for 3D sensor data. This paper outlines seven CV tasks with 3D point cloud data, state-of-the-art techniques, and datasets. Additionally, we identify key challenges.
计算机视觉(CV)是机器学习(ML)的一个快速发展的分支。它解决了机器人、医学、自动驾驶、监控、安全或场景理解等各种重要任务。传感器技术的发展使3D传感器得到了广泛的应用,因此,它增加了CV研究界对创建3D传感器数据方法的兴趣。本文概述了七个CV任务与3D点云数据,最先进的技术,和数据集。此外,我们还确定了主要挑战。
{"title":"Computer Vision with 3D Point Cloud Data: Methods, Datasets and Challenges","authors":"Amila Akagic, Senka Krivic, Harun Dizdar, J. Velagić","doi":"10.1109/ICAT54566.2022.9811120","DOIUrl":"https://doi.org/10.1109/ICAT54566.2022.9811120","url":null,"abstract":"The scientific discipline of Computer Vision (CV) is a fast developing branch of Machine Learning (ML). It addresses various tasks important for robotics, medicine, autonomous driving, surveillance, security or scene understanding. The development of sensor technologies enabled wide usage of 3D sensors, and therefore, it increased the interest of the CV research community in creating methods for 3D sensor data. This paper outlines seven CV tasks with 3D point cloud data, state-of-the-art techniques, and datasets. Additionally, we identify key challenges.","PeriodicalId":414786,"journal":{"name":"2022 XXVIII International Conference on Information, Communication and Automation Technologies (ICAT)","volume":"193 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116167796","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2022 XXVIII International Conference on Information, Communication and Automation Technologies (ICAT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1