Pub Date : 2022-06-16DOI: 10.1109/ICAT54566.2022.9811108
Fejsal Perva, Harun Tucakovic, Muhammed Musanovic, Emine Yaman
Nowadays, cardiovascular diseases are one of the leading causes of death. Earlier and better detection of such diseases would lead to earlier treatment and eventually to better chances of patients being able to overcome those diseases. Machine learning algorithms have been proven useful in detecting several medical conditions based on patients’ characteristics. In this paper, we are trying to predict whether a patient has a cardiovascular disease based on their characteristics. Using decision trees (C4.5), k-NN, and Naïve Bayes, in combination with cross-validation and holdout methods, we were able to achieve relatively good results. Even better results were achieved, for some specific cases such as patients having hypertension stage 2 or 3.
{"title":"Prediction of cardiovascular disease","authors":"Fejsal Perva, Harun Tucakovic, Muhammed Musanovic, Emine Yaman","doi":"10.1109/ICAT54566.2022.9811108","DOIUrl":"https://doi.org/10.1109/ICAT54566.2022.9811108","url":null,"abstract":"Nowadays, cardiovascular diseases are one of the leading causes of death. Earlier and better detection of such diseases would lead to earlier treatment and eventually to better chances of patients being able to overcome those diseases. Machine learning algorithms have been proven useful in detecting several medical conditions based on patients’ characteristics. In this paper, we are trying to predict whether a patient has a cardiovascular disease based on their characteristics. Using decision trees (C4.5), k-NN, and Naïve Bayes, in combination with cross-validation and holdout methods, we were able to achieve relatively good results. Even better results were achieved, for some specific cases such as patients having hypertension stage 2 or 3.","PeriodicalId":414786,"journal":{"name":"2022 XXVIII International Conference on Information, Communication and Automation Technologies (ICAT)","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115809313","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-06-16DOI: 10.1109/ICAT54566.2022.9811125
V. Utkin, Isaac Chairez
The article discusses two types of power converters for obtaining sinusoidal signals at the output with the desired amplitude and frequency. In the first case, the source of energy is a constant voltage, in the second - a three-phase voltage source. In both cases, the output value of the converter is a sinusoidal voltage without higher harmonics. In the second version, the power factor of the consumed energy is one. Low power part of the alternator is nonlinear dynamic system generating the desired signal in sliding mode. Then the signal is tracked in high power part in sliding mode as well.
{"title":"Alternator with controllable frequency and amplitude","authors":"V. Utkin, Isaac Chairez","doi":"10.1109/ICAT54566.2022.9811125","DOIUrl":"https://doi.org/10.1109/ICAT54566.2022.9811125","url":null,"abstract":"The article discusses two types of power converters for obtaining sinusoidal signals at the output with the desired amplitude and frequency. In the first case, the source of energy is a constant voltage, in the second - a three-phase voltage source. In both cases, the output value of the converter is a sinusoidal voltage without higher harmonics. In the second version, the power factor of the consumed energy is one. Low power part of the alternator is nonlinear dynamic system generating the desired signal in sliding mode. Then the signal is tracked in high power part in sliding mode as well.","PeriodicalId":414786,"journal":{"name":"2022 XXVIII International Conference on Information, Communication and Automation Technologies (ICAT)","volume":"95 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121578747","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-06-16DOI: 10.1109/ICAT54566.2022.9811237
Chi-Cheng Cheng, Yi-Min Chiu, An Liu
Hand-eye coordination control is one of the dexterous operational skills of mankind. This study reproduces human-like hitting strategies based on hand-eye coordination techniques for bouncing a ping pong ball with a robotic manipulator holding a paddle and an RGB-D camera. The target ball and the background are first separated by using the color information. The target ball’s position in the world coordinate frame can therefore be obtained by incorporating the depth information. Analysis of forces exerted on the ball is able to predict its future motion trajectory. In addition, a to-the-center and an adaptive learning hitting strategies based on manipulation skills of humans are developed to overcome difficulties caused by uncertainties and unknown parameters for the successive bouncing task. The to-the-center strategy tends to bounce the ball towards the center of the paddle, not just vertically upwards in a classical approach, in order to maintain the ball in the reachable region. However, the adaptive learning strategy provides controls of the inclination and the hitting force for the paddle according to previous bounce behavior of the ball. Actual bouncing experiments with a three degrees-of-freedom robotic wrist were conducted using three different bouncing strategies: the classical vertical approach, the to-the-center strategy, and the adaptive learning strategy. Experimental results demonstrate that the proposed adaptive learning hitting strategy displays best bouncing performance in terms of average bouncing number of times and average distance of contact point away from the center.
{"title":"Human-like Hitting Strategies for a Ball Bouncing Robot","authors":"Chi-Cheng Cheng, Yi-Min Chiu, An Liu","doi":"10.1109/ICAT54566.2022.9811237","DOIUrl":"https://doi.org/10.1109/ICAT54566.2022.9811237","url":null,"abstract":"Hand-eye coordination control is one of the dexterous operational skills of mankind. This study reproduces human-like hitting strategies based on hand-eye coordination techniques for bouncing a ping pong ball with a robotic manipulator holding a paddle and an RGB-D camera. The target ball and the background are first separated by using the color information. The target ball’s position in the world coordinate frame can therefore be obtained by incorporating the depth information. Analysis of forces exerted on the ball is able to predict its future motion trajectory. In addition, a to-the-center and an adaptive learning hitting strategies based on manipulation skills of humans are developed to overcome difficulties caused by uncertainties and unknown parameters for the successive bouncing task. The to-the-center strategy tends to bounce the ball towards the center of the paddle, not just vertically upwards in a classical approach, in order to maintain the ball in the reachable region. However, the adaptive learning strategy provides controls of the inclination and the hitting force for the paddle according to previous bounce behavior of the ball. Actual bouncing experiments with a three degrees-of-freedom robotic wrist were conducted using three different bouncing strategies: the classical vertical approach, the to-the-center strategy, and the adaptive learning strategy. Experimental results demonstrate that the proposed adaptive learning hitting strategy displays best bouncing performance in terms of average bouncing number of times and average distance of contact point away from the center.","PeriodicalId":414786,"journal":{"name":"2022 XXVIII International Conference on Information, Communication and Automation Technologies (ICAT)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122201959","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-06-16DOI: 10.1109/ICAT54566.2022.9811227
J. Velagić, Haris Balta
This paper treats the problem of 3D outdoor environment mapping using images acquired by Unmanned Aerial Vehicle (UAV). The main focus is on the generation of 3D model for large scale environments. In order to perform 3D model reconstruction and mapping from 2D aerial images we employed a Structure from Motion (SfM) based approach. The obtained results using this approach for different scenarios, the rubble field and village, are presented. The generated UAV 3D point cloud data are compared with the ground truth using the least square method, where the ground truth represents a reference model with high accuracy geodetic precision. The comparison of the 3D environment models with the rubble field and village scenarios and the ground truth data is also given.
{"title":"3D UAV Registration of Large Scale Environment Using Structure From Motion Based Approach","authors":"J. Velagić, Haris Balta","doi":"10.1109/ICAT54566.2022.9811227","DOIUrl":"https://doi.org/10.1109/ICAT54566.2022.9811227","url":null,"abstract":"This paper treats the problem of 3D outdoor environment mapping using images acquired by Unmanned Aerial Vehicle (UAV). The main focus is on the generation of 3D model for large scale environments. In order to perform 3D model reconstruction and mapping from 2D aerial images we employed a Structure from Motion (SfM) based approach. The obtained results using this approach for different scenarios, the rubble field and village, are presented. The generated UAV 3D point cloud data are compared with the ground truth using the least square method, where the ground truth represents a reference model with high accuracy geodetic precision. The comparison of the 3D environment models with the rubble field and village scenarios and the ground truth data is also given.","PeriodicalId":414786,"journal":{"name":"2022 XXVIII International Conference on Information, Communication and Automation Technologies (ICAT)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122722654","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-06-16DOI: 10.1109/ICAT54566.2022.9811191
Oleksandr V Lemeshko, Oleksandra Yeremenko, A. Mersni, J. Gazda
The paper presents an improved method of confidential messages secure routing over intersecting paths in cyber resilient networks. It allows making fuller use of the available network resources. Within the method, the level of network security of routes, networks, and confidential messages, in general, was assessed due to the compromise probability of the network links. In turn, the message compromise probability is calculated by the formula of total probability, considering the level of network security of bridges in the network structure without prior calculation of disjoint paths set. According to the numerical study results of the method application, the most significant gain in terms of the message compromise probability has been obtained at a relatively low level of cyber threats in the network. The secure routing method was implemented and presented by software prototypes of secure routing protocols that can form the basis of advanced routing protocols supporting network security metrics.
{"title":"Improvement of Confidential Messages Secure Routing over Paths with Intersection in Cyber Resilient Networks","authors":"Oleksandr V Lemeshko, Oleksandra Yeremenko, A. Mersni, J. Gazda","doi":"10.1109/ICAT54566.2022.9811191","DOIUrl":"https://doi.org/10.1109/ICAT54566.2022.9811191","url":null,"abstract":"The paper presents an improved method of confidential messages secure routing over intersecting paths in cyber resilient networks. It allows making fuller use of the available network resources. Within the method, the level of network security of routes, networks, and confidential messages, in general, was assessed due to the compromise probability of the network links. In turn, the message compromise probability is calculated by the formula of total probability, considering the level of network security of bridges in the network structure without prior calculation of disjoint paths set. According to the numerical study results of the method application, the most significant gain in terms of the message compromise probability has been obtained at a relatively low level of cyber threats in the network. The secure routing method was implemented and presented by software prototypes of secure routing protocols that can form the basis of advanced routing protocols supporting network security metrics.","PeriodicalId":414786,"journal":{"name":"2022 XXVIII International Conference on Information, Communication and Automation Technologies (ICAT)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125958202","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
With the increasingly complex application scenarios of indoor mobile robots, traditional navigation methods based on metric maps have been unable to meet people’s needs. Mobile robots not only need to perceive the spatial geometric information of the environment, but also need to deeply and comprehensively understand the semantic information of the environment in order to perform tasks such as complex behavioral decision-making and human-computer interaction. In this paper, we propose a semantic mapping system for indoor environments based on a monocular camera and a laser. The semantic mapping system adopts the technique of scene classification to construct the scene semantics of indoor environments, in which the semantic classifier is embedded into a recurrent neural network to better learn the correlation of consecutive frames. Experimental results indicate that the proposed semantic mapping system exhibits great performance in the robustness and accuracy of semantic mapping.
{"title":"A Semantic Mapping System Based on Scene Classification for Indoor Mobile Robots","authors":"Xueyuan Song, Xu Liang, Zhijiang Zuo, Huaidong Zhou","doi":"10.1109/ICAT54566.2022.9811222","DOIUrl":"https://doi.org/10.1109/ICAT54566.2022.9811222","url":null,"abstract":"With the increasingly complex application scenarios of indoor mobile robots, traditional navigation methods based on metric maps have been unable to meet people’s needs. Mobile robots not only need to perceive the spatial geometric information of the environment, but also need to deeply and comprehensively understand the semantic information of the environment in order to perform tasks such as complex behavioral decision-making and human-computer interaction. In this paper, we propose a semantic mapping system for indoor environments based on a monocular camera and a laser. The semantic mapping system adopts the technique of scene classification to construct the scene semantics of indoor environments, in which the semantic classifier is embedded into a recurrent neural network to better learn the correlation of consecutive frames. Experimental results indicate that the proposed semantic mapping system exhibits great performance in the robustness and accuracy of semantic mapping.","PeriodicalId":414786,"journal":{"name":"2022 XXVIII International Conference on Information, Communication and Automation Technologies (ICAT)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128905211","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-06-16DOI: 10.1109/ICAT54566.2022.9811134
A. Tihak, Nahla Salaka, D. Boskovic
The application of spectral analysis methods to the heart rate (HR) signal is challenging due to the nature of the signal itself, which is non-uniform. Methods for non-uniform signals can be applied directly, whilst the methods designed for uniform signals can be used after the signal is adequately preprocessed beforehand. Preprocessing consists of interpolation and resampling. In this paper, we have implemented a tool for explorative evaluation of various spectral analysis methods applied to HR signal. The tool is based on heat maps used for visualization of frequency metrics for the ECG signals selected from the MIT-BIH Arrhythmia Database. Evaluated methods are the Lomb-Scargle method for nonuniform signal analysis and Welch's method which is applied in conjunction with different interpolation approaches. A set of frequency-domain metrics are evaluated with the proposed tool for exploratory analysis. The evaluation indicates that the Lomb-Scargle method produces a loss of information in certain frequency bands. Furthermore, Welch method better demonstrates the difference in spectral power metrics for frequency bands of interest, irrespective of the type of interpolation used.
{"title":"Explorative Evaluation of Heart Rate Variability Spectral Analysis Approaches","authors":"A. Tihak, Nahla Salaka, D. Boskovic","doi":"10.1109/ICAT54566.2022.9811134","DOIUrl":"https://doi.org/10.1109/ICAT54566.2022.9811134","url":null,"abstract":"The application of spectral analysis methods to the heart rate (HR) signal is challenging due to the nature of the signal itself, which is non-uniform. Methods for non-uniform signals can be applied directly, whilst the methods designed for uniform signals can be used after the signal is adequately preprocessed beforehand. Preprocessing consists of interpolation and resampling. In this paper, we have implemented a tool for explorative evaluation of various spectral analysis methods applied to HR signal. The tool is based on heat maps used for visualization of frequency metrics for the ECG signals selected from the MIT-BIH Arrhythmia Database. Evaluated methods are the Lomb-Scargle method for nonuniform signal analysis and Welch's method which is applied in conjunction with different interpolation approaches. A set of frequency-domain metrics are evaluated with the proposed tool for exploratory analysis. The evaluation indicates that the Lomb-Scargle method produces a loss of information in certain frequency bands. Furthermore, Welch method better demonstrates the difference in spectral power metrics for frequency bands of interest, irrespective of the type of interpolation used.","PeriodicalId":414786,"journal":{"name":"2022 XXVIII International Conference on Information, Communication and Automation Technologies (ICAT)","volume":"112 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133516633","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-06-16DOI: 10.1109/ICAT54566.2022.9811238
E. Dervisevic, Filip Lauterbach, Patrik Burdiak, J. Rozhon, Martina Slívová, Matej Plakalovic, M. Hamza, P. Fazio, M. Voznák, M. Mehic
A QKD network can be considered an add-on technology to a standard communication network that provides IT-secure cryptographic keys as a service. As a result, security challenges resulting in the suspension of functional work must be addressed. This study analyzes a Denial of Service (DoS) attack on the Key Management System (KMS), one of the critical components of the QKD network in charge of key management and key provisioning to authorized consumers. Through simulation methods performed in the QKDNetSim, we show that legitimate customers experience significantly worse service during an excessive DoS attack on KMS.
{"title":"Simulations of Denial of Service Attacks in Quantum Key Distribution Networks","authors":"E. Dervisevic, Filip Lauterbach, Patrik Burdiak, J. Rozhon, Martina Slívová, Matej Plakalovic, M. Hamza, P. Fazio, M. Voznák, M. Mehic","doi":"10.1109/ICAT54566.2022.9811238","DOIUrl":"https://doi.org/10.1109/ICAT54566.2022.9811238","url":null,"abstract":"A QKD network can be considered an add-on technology to a standard communication network that provides IT-secure cryptographic keys as a service. As a result, security challenges resulting in the suspension of functional work must be addressed. This study analyzes a Denial of Service (DoS) attack on the Key Management System (KMS), one of the critical components of the QKD network in charge of key management and key provisioning to authorized consumers. Through simulation methods performed in the QKDNetSim, we show that legitimate customers experience significantly worse service during an excessive DoS attack on KMS.","PeriodicalId":414786,"journal":{"name":"2022 XXVIII International Conference on Information, Communication and Automation Technologies (ICAT)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132066065","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-06-16DOI: 10.1109/ICAT54566.2022.9811190
Ajdin Alihodžić, A. Mujezinović, E. Turajlić, Nedis Dautbašić
This paper considers calculation methods for the electric field intensity and magnetic flux density in the vicinity of the overhead transmission lines, as well as the calculation of alternating current (AC) corona onset electric field intensity. Calculations within this paper are made using the 2D algorithms of Charge Simulation Method (CSM) and Biot-Savart (BS) law based method. In order to obtain more accurate results, calculations are made by representing each overhead transmission line conductor with a large number of electric and magnetic field sources. By applying this approach, bundle conductors can be represented in a more realistic way and also singularity problems can be avoided when calculating electric field intensity. The presented methods are applied to a real overhead transmission line configuration, and obtained results are compared with field measurement results over the lateral profile. For considered overhead transmission line, AC corona onset electric field intensity is calculated and compared with calculated electric field intensity on the conductor’s surface. A comparison of calculated and measured results shows that considered calculation methods give satisfactory results.
{"title":"Calculation of the Electric Field Intensity and Magnetic Flux Density Generated by High Voltage Overhead Transmission Lines","authors":"Ajdin Alihodžić, A. Mujezinović, E. Turajlić, Nedis Dautbašić","doi":"10.1109/ICAT54566.2022.9811190","DOIUrl":"https://doi.org/10.1109/ICAT54566.2022.9811190","url":null,"abstract":"This paper considers calculation methods for the electric field intensity and magnetic flux density in the vicinity of the overhead transmission lines, as well as the calculation of alternating current (AC) corona onset electric field intensity. Calculations within this paper are made using the 2D algorithms of Charge Simulation Method (CSM) and Biot-Savart (BS) law based method. In order to obtain more accurate results, calculations are made by representing each overhead transmission line conductor with a large number of electric and magnetic field sources. By applying this approach, bundle conductors can be represented in a more realistic way and also singularity problems can be avoided when calculating electric field intensity. The presented methods are applied to a real overhead transmission line configuration, and obtained results are compared with field measurement results over the lateral profile. For considered overhead transmission line, AC corona onset electric field intensity is calculated and compared with calculated electric field intensity on the conductor’s surface. A comparison of calculated and measured results shows that considered calculation methods give satisfactory results.","PeriodicalId":414786,"journal":{"name":"2022 XXVIII International Conference on Information, Communication and Automation Technologies (ICAT)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125794538","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-06-16DOI: 10.1109/ICAT54566.2022.9811214
Yakup Aktaş, Merve Acer Kalafat
There are many standard procedures that washing machines must provide. One of them is the washing performance, which shows the cleanliness of the laundry. This measurement, called the washing performance index, must meet the criteria determined according to the relevant standard in repeated tests. However, the washing and cleaning process is a complex process affected by many parameters such as mechanical effects, chemical effects, temperature, and amount of water. We propose an approach to determine the effect of these multi-parameter effects on washing performance and estimate the washing performance of the washing machine without the need for trial tests before the algorithm design. The approach uses artificial neural network algorithms to estimate washing performance by varying the relevant input parameters accurately. In order to establish the structure of the neural network, we have performed experimental tests on washing machines with different features and different input parameters and used them for training, validation, and test sets. According to the results obtained, it has been shown that it is possible to predict the washing performance index with neural networks accurately.
{"title":"Estimation of Washing Performance in Washing Machines with Neural Networks","authors":"Yakup Aktaş, Merve Acer Kalafat","doi":"10.1109/ICAT54566.2022.9811214","DOIUrl":"https://doi.org/10.1109/ICAT54566.2022.9811214","url":null,"abstract":"There are many standard procedures that washing machines must provide. One of them is the washing performance, which shows the cleanliness of the laundry. This measurement, called the washing performance index, must meet the criteria determined according to the relevant standard in repeated tests. However, the washing and cleaning process is a complex process affected by many parameters such as mechanical effects, chemical effects, temperature, and amount of water. We propose an approach to determine the effect of these multi-parameter effects on washing performance and estimate the washing performance of the washing machine without the need for trial tests before the algorithm design. The approach uses artificial neural network algorithms to estimate washing performance by varying the relevant input parameters accurately. In order to establish the structure of the neural network, we have performed experimental tests on washing machines with different features and different input parameters and used them for training, validation, and test sets. According to the results obtained, it has been shown that it is possible to predict the washing performance index with neural networks accurately.","PeriodicalId":414786,"journal":{"name":"2022 XXVIII International Conference on Information, Communication and Automation Technologies (ICAT)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132828179","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}