Valerie Reif, Thomas I. Strasser, Joseba Jimeno, Marjolaine Farre, Oliver Genest, Amélie Gyrard, Mark McGranaghan, Gianluca Lipari, Johann Schütz, Mathias Uslar, Sebastian Vogel, Arsim Bytyqi, Rita Dornmair, Andreas Corusa, Gaurav Roy, Ferdinanda Ponci, Alberto Dognini, Antonello Monti
Smart grid interoperability is the means to achieve the twin green and digital transition but re-mains heterogeneous and fragmented to date. This work presents the first ideas and corner-stones of an Interoperability Roadmap for the Energy Transition that is being developed by the Horizon Europe int:net project. This roadmap builds on four cornerstones that address open interoperability issues. These are a knowledge base to address the lack of convergence among existing initiatives, a maturity model and a network of testing and certification facilities to ad-dress the lack of practical tools for the industry, and a governance process to address the gap between standards-related approaches of Standards Development Organisations and Research and Innovation projects. A community of practice will be set up to ensure the continuity of the ongoing activities related to smart grid interoperability. To outlive the duration of the int:net project, the aim is to formalise the community of practice as a legal entity.
{"title":"Towards an Interoperability Roadmap for the Energy Transition","authors":"Valerie Reif, Thomas I. Strasser, Joseba Jimeno, Marjolaine Farre, Oliver Genest, Amélie Gyrard, Mark McGranaghan, Gianluca Lipari, Johann Schütz, Mathias Uslar, Sebastian Vogel, Arsim Bytyqi, Rita Dornmair, Andreas Corusa, Gaurav Roy, Ferdinanda Ponci, Alberto Dognini, Antonello Monti","doi":"arxiv-2309.08284","DOIUrl":"https://doi.org/arxiv-2309.08284","url":null,"abstract":"Smart grid interoperability is the means to achieve the twin green and\u0000digital transition but re-mains heterogeneous and fragmented to date. This work\u0000presents the first ideas and corner-stones of an Interoperability Roadmap for\u0000the Energy Transition that is being developed by the Horizon Europe int:net\u0000project. This roadmap builds on four cornerstones that address open\u0000interoperability issues. These are a knowledge base to address the lack of\u0000convergence among existing initiatives, a maturity model and a network of\u0000testing and certification facilities to ad-dress the lack of practical tools\u0000for the industry, and a governance process to address the gap between\u0000standards-related approaches of Standards Development Organisations and\u0000Research and Innovation projects. A community of practice will be set up to\u0000ensure the continuity of the ongoing activities related to smart grid\u0000interoperability. To outlive the duration of the int:net project, the aim is to\u0000formalise the community of practice as a legal entity.","PeriodicalId":501310,"journal":{"name":"arXiv - CS - Other Computer Science","volume":"334 ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138523255","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Literacy, or the ability to read and write, is a crucial indicator of success in life and greater society. It is estimated that 85% of people in juvenile delinquent systems cannot adequately read or write, that more than half of those with substance abuse issues have complications in reading or writing and that two-thirds of those who do not complete high school lack proper literacy skills. Furthermore, young children who do not possess reading skills matching grade level by the fourth grade are approximately 80% likely to not catch up at all. Many may believe that in a developed country such as the United States, literacy fails to be an issue; however, this is a dangerous misunderstanding. Globally an estimated 1.19 trillion dollars are lost every year due to issues in literacy; in the USA, the loss is an estimated 300 billion. To put it in more shocking terms, one in five American adults still fail to comprehend basic sentences. Making matters worse, the only tools available now to correct a lack of reading and writing ability are found in expensive tutoring or other programs that oftentimes fail to be able to reach the required audience. In this paper, our team puts forward a new way of teaching English spelling and word recognitions to grade school students in the United States: Wordification. Wordification is a web application designed to teach English literacy using principles of linguistics applied to the orthographic and phonological properties of words in a manner not fully utilized previously in any computer-based teaching application.
{"title":"Wordification: A New Way of Teaching English Spelling Patterns","authors":"Lexington Whalen, Nathan Bickel, Shash Comandur, Dalton Craven, Stanley Dubinsky, Homayoun Valafar","doi":"arxiv-2309.12981","DOIUrl":"https://doi.org/arxiv-2309.12981","url":null,"abstract":"Literacy, or the ability to read and write, is a crucial indicator of success\u0000in life and greater society. It is estimated that 85% of people in juvenile\u0000delinquent systems cannot adequately read or write, that more than half of\u0000those with substance abuse issues have complications in reading or writing and\u0000that two-thirds of those who do not complete high school lack proper literacy\u0000skills. Furthermore, young children who do not possess reading skills matching\u0000grade level by the fourth grade are approximately 80% likely to not catch up at\u0000all. Many may believe that in a developed country such as the United States,\u0000literacy fails to be an issue; however, this is a dangerous misunderstanding.\u0000Globally an estimated 1.19 trillion dollars are lost every year due to issues\u0000in literacy; in the USA, the loss is an estimated 300 billion. To put it in\u0000more shocking terms, one in five American adults still fail to comprehend basic\u0000sentences. Making matters worse, the only tools available now to correct a lack\u0000of reading and writing ability are found in expensive tutoring or other\u0000programs that oftentimes fail to be able to reach the required audience. In\u0000this paper, our team puts forward a new way of teaching English spelling and\u0000word recognitions to grade school students in the United States: Wordification.\u0000Wordification is a web application designed to teach English literacy using\u0000principles of linguistics applied to the orthographic and phonological\u0000properties of words in a manner not fully utilized previously in any\u0000computer-based teaching application.","PeriodicalId":501310,"journal":{"name":"arXiv - CS - Other Computer Science","volume":"53 S3","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-08-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138523074","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Abdulah Jarouf, Javier Hernandez Fernandez, Aymen Omri, Roberto Di Pietro
High-frequency signals were widely studied in the last decade to identify grid and channel conditions in PLNs. PLMs operating on the grid's physical layer are capable of transmitting such signals to infer information about the grid. Hence, PLC is a suitable communication technology for SG applications, especially suited for grid monitoring and surveillance. In this paper, we provide several contributions: 1) a classification of PLC-based applications; 2) a taxonomy of the related methodologies; 3) a review of the literature in the area of PLC Grid Information Inference (GII); and, insights that can be leveraged to further advance the field. We found research contributions addressing PLMs for three main PLC-GII applications: topology inference, anomaly detection, and physical layer key generation. In addition, various PLC-GII measurement, processing, and analysis approaches were found to provide distinctive features in measurement resolution, computation complexity, and analysis accuracy. We utilize the outcome of our review to shed light on the current limitations of the research contributions and suggest future research directions in this field.
{"title":"Inferring Power Grid Information with Power Line Communications: Review and Insights","authors":"Abdulah Jarouf, Javier Hernandez Fernandez, Aymen Omri, Roberto Di Pietro","doi":"arxiv-2308.10598","DOIUrl":"https://doi.org/arxiv-2308.10598","url":null,"abstract":"High-frequency signals were widely studied in the last decade to identify\u0000grid and channel conditions in PLNs. PLMs operating on the grid's physical\u0000layer are capable of transmitting such signals to infer information about the\u0000grid. Hence, PLC is a suitable communication technology for SG applications,\u0000especially suited for grid monitoring and surveillance. In this paper, we\u0000provide several contributions: 1) a classification of PLC-based applications;\u00002) a taxonomy of the related methodologies; 3) a review of the literature in\u0000the area of PLC Grid Information Inference (GII); and, insights that can be\u0000leveraged to further advance the field. We found research contributions\u0000addressing PLMs for three main PLC-GII applications: topology inference,\u0000anomaly detection, and physical layer key generation. In addition, various\u0000PLC-GII measurement, processing, and analysis approaches were found to provide\u0000distinctive features in measurement resolution, computation complexity, and\u0000analysis accuracy. We utilize the outcome of our review to shed light on the\u0000current limitations of the research contributions and suggest future research\u0000directions in this field.","PeriodicalId":501310,"journal":{"name":"arXiv - CS - Other Computer Science","volume":"52 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-08-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138523256","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Recent statistics have demonstrated that missing items have become the main cause of loss for retailers in inventory management. To quickly identify missing tags, traditional protocols adopt Aloha-based strategies which take a long time, especially when the number of tags is large. Among them, few works considered the effect of unexpected unknown tags on the missing tag identification process. With the presence of unknown tags, some missing tags may be falsely identified as present. Thus, the system's reliability is hardly guaranteed. In this work, we propose an efficient early-breaking estimation and tree-splitting-based missing tag identification (ETMTI) protocol for large-scale RFID systems. In ETMTI, a new early-breaking estimation and deactivation method is developed to effectively estimate the number of unknown tags and deactivate them within a short time. Next, a new tree-splitting-based missing tag identification method is proposed to quickly identify missing tags with a B-ary splitting tree. Besides, a bit-tracking response strategy is designed to further reduce the time cost. The optimal parameters, time cost, and false negative rate of ETMTI are analyzed theoretically. Simulation results are presented to demonstrate that the proposed ETMTI protocol takes a smaller time and has a lower false negative rate than the best-performing benchmarks.
{"title":"An Efficient Early-breaking Estimation and Tree-splitting Missing RFID Tag Identification Protocol","authors":"Lijuan Zhang, Mingqiu Fan, Chunni Yu, Lei Lei","doi":"arxiv-2308.09484","DOIUrl":"https://doi.org/arxiv-2308.09484","url":null,"abstract":"Recent statistics have demonstrated that missing items have become the main\u0000cause of loss for retailers in inventory management. To quickly identify\u0000missing tags, traditional protocols adopt Aloha-based strategies which take a\u0000long time, especially when the number of tags is large. Among them, few works\u0000considered the effect of unexpected unknown tags on the missing tag\u0000identification process. With the presence of unknown tags, some missing tags\u0000may be falsely identified as present. Thus, the system's reliability is hardly\u0000guaranteed. In this work, we propose an efficient early-breaking estimation and\u0000tree-splitting-based missing tag identification (ETMTI) protocol for\u0000large-scale RFID systems. In ETMTI, a new early-breaking estimation and\u0000deactivation method is developed to effectively estimate the number of unknown\u0000tags and deactivate them within a short time. Next, a new tree-splitting-based\u0000missing tag identification method is proposed to quickly identify missing tags\u0000with a B-ary splitting tree. Besides, a bit-tracking response strategy is\u0000designed to further reduce the time cost. The optimal parameters, time cost,\u0000and false negative rate of ETMTI are analyzed theoretically. Simulation results\u0000are presented to demonstrate that the proposed ETMTI protocol takes a smaller\u0000time and has a lower false negative rate than the best-performing benchmarks.","PeriodicalId":501310,"journal":{"name":"arXiv - CS - Other Computer Science","volume":"87 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-08-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138523253","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The use of Radio Frequency Identification (RFID) technology is ubiquitous in a number of businesses and sectors, including retail sales, smart cities, agriculture, and transportation. Additionally, educational institutions have started using RFID to track student attendance, combining this technology with Google Sheets and the Internet of Things (IoT) to build a real-time attendance tracking system. For a thorough examination of the creation of a student attendance system, this paper includes a systematic literature evaluation of 21 major research published on IoT based attendance systems employing RFID. This RFID-based attendance system enables automation, eliminating several problems connected with the manual process, such as time wasting, proxies, and the possibility of losing the attendance sheet, in contrast to the traditional attendance system, which depends on manual signatures. By creating a system that automatically registers students' attendance by merely flashing their student cards at the RFID reader, all the aforementioned difficulties may be successfully addressed. This automated method guarantees attendance monitoring accuracy and dependability while also saving time. This paper's conclusion highlights the significant advantages of implementing an IoT-based attendance system based on RFID technology. The suggested solution provides a trustworthy, efficient, and secure alternative to manual attendance techniques, successfully addressing their shortcomings. This paper offers helpful insights for institutions looking to create a cutting-edge attendance system that increases student involvement and academic achievement by looking at guiding principles, best practices, and the successful resolution of difficulties.
{"title":"IoT Based Smart Attendance System Using Rfid: A Systematic Literature Review","authors":"Kashif Ishaq, Samra Bibi","doi":"arxiv-2308.02591","DOIUrl":"https://doi.org/arxiv-2308.02591","url":null,"abstract":"The use of Radio Frequency Identification (RFID) technology is ubiquitous in\u0000a number of businesses and sectors, including retail sales, smart cities,\u0000agriculture, and transportation. Additionally, educational institutions have\u0000started using RFID to track student attendance, combining this technology with\u0000Google Sheets and the Internet of Things (IoT) to build a real-time attendance\u0000tracking system. For a thorough examination of the creation of a student\u0000attendance system, this paper includes a systematic literature evaluation of 21\u0000major research published on IoT based attendance systems employing RFID. This\u0000RFID-based attendance system enables automation, eliminating several problems\u0000connected with the manual process, such as time wasting, proxies, and the\u0000possibility of losing the attendance sheet, in contrast to the traditional\u0000attendance system, which depends on manual signatures. By creating a system\u0000that automatically registers students' attendance by merely flashing their\u0000student cards at the RFID reader, all the aforementioned difficulties may be\u0000successfully addressed. This automated method guarantees attendance monitoring\u0000accuracy and dependability while also saving time. This paper's conclusion\u0000highlights the significant advantages of implementing an IoT-based attendance\u0000system based on RFID technology. The suggested solution provides a trustworthy,\u0000efficient, and secure alternative to manual attendance techniques, successfully\u0000addressing their shortcomings. This paper offers helpful insights for\u0000institutions looking to create a cutting-edge attendance system that increases\u0000student involvement and academic achievement by looking at guiding principles,\u0000best practices, and the successful resolution of difficulties.","PeriodicalId":501310,"journal":{"name":"arXiv - CS - Other Computer Science","volume":"15 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138523320","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Poisson's equation has been used in VLSI global placement for describing the potential field caused by a given charge density distribution. Unlike previous global placement methods that solve Poisson's equation numerically, in this paper, we provide an analytical solution of the equation to calculate the potential energy of an electrostatic system. The analytical solution is derived based on the separation of variables method and an exact density function to model the block distribution in the placement region, which is an infinite series and converges absolutely. Using the analytical solution, we give a fast computation scheme of Poisson's equation and develop an effective and efficient global placement algorithm called Pplace. Experimental results show that our Pplace achieves smaller placement wirelength than ePlace and NTUplace3. With the pervasive applications of Poisson's equation in scientific fields, in particular, our effective, efficient, and robust computation scheme for its analytical solution can provide substantial impacts on these fields.
{"title":"Analytical Solution of Poisson's Equation with Application to VLSI Global Placement","authors":"Wenxing Zhu, Zhipeng Huang, Jianli Chen, Yao-Wen Chang","doi":"arxiv-2307.12041","DOIUrl":"https://doi.org/arxiv-2307.12041","url":null,"abstract":"Poisson's equation has been used in VLSI global placement for describing the\u0000potential field caused by a given charge density distribution. Unlike previous\u0000global placement methods that solve Poisson's equation numerically, in this\u0000paper, we provide an analytical solution of the equation to calculate the\u0000potential energy of an electrostatic system. The analytical solution is derived\u0000based on the separation of variables method and an exact density function to\u0000model the block distribution in the placement region, which is an infinite\u0000series and converges absolutely. Using the analytical solution, we give a fast\u0000computation scheme of Poisson's equation and develop an effective and efficient\u0000global placement algorithm called Pplace. Experimental results show that our\u0000Pplace achieves smaller placement wirelength than ePlace and NTUplace3. With\u0000the pervasive applications of Poisson's equation in scientific fields, in\u0000particular, our effective, efficient, and robust computation scheme for its\u0000analytical solution can provide substantial impacts on these fields.","PeriodicalId":501310,"journal":{"name":"arXiv - CS - Other Computer Science","volume":"35 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-07-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138522108","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Despite the critical importance of Digital Transformation, up to 95% of initiatives fail to deliver expected business benefits. This paper explores the role of Business Architecture practices in enhancing digital transformation success. Using an adapted Balanced Scorecard approach and a Structural Equation Model (SEM), we analysed survey responses from 129 industry practitioners using a Partial Least Squares (PLS) approach. Our findings indicate that effective business architecture practices significantly improve business alignment, efficiency, service delivery, and strategic outcomes, leading to successful digital transformation. The study also validates factors proposed by AL-Malaise AL-Ghamdi (2017) in the context of digital transformation. The paper presents an adapted conceptual model addressing discriminant validity issues in previous models and benefiting from the robustness of the Balanced Scorecard approach. The study concludes by highlighting the essential role of business architecture in driving digital transformation success.
{"title":"Impacts of Business Architecture in the Context of Digital Transformation: An Empirical Study Using PLS-SEM Approach","authors":"Dennis O'Higgins","doi":"arxiv-2307.11895","DOIUrl":"https://doi.org/arxiv-2307.11895","url":null,"abstract":"Despite the critical importance of Digital Transformation, up to 95% of\u0000initiatives fail to deliver expected business benefits. This paper explores the\u0000role of Business Architecture practices in enhancing digital transformation\u0000success. Using an adapted Balanced Scorecard approach and a Structural Equation\u0000Model (SEM), we analysed survey responses from 129 industry practitioners using\u0000a Partial Least Squares (PLS) approach. Our findings indicate that effective\u0000business architecture practices significantly improve business alignment,\u0000efficiency, service delivery, and strategic outcomes, leading to successful\u0000digital transformation. The study also validates factors proposed by AL-Malaise\u0000AL-Ghamdi (2017) in the context of digital transformation. The paper presents\u0000an adapted conceptual model addressing discriminant validity issues in previous\u0000models and benefiting from the robustness of the Balanced Scorecard approach.\u0000The study concludes by highlighting the essential role of business architecture\u0000in driving digital transformation success.","PeriodicalId":501310,"journal":{"name":"arXiv - CS - Other Computer Science","volume":"23 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-07-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138522025","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Christoph Glasmacher, Michael Schuldes, Hendrik Weber, Nicolas Wagener, Lutz Eckstein
Scenario-based testing is becoming increasingly important in safety assurance for automated driving. However, comprehensive and sufficiently complete coverage of the scenario space requires significant effort and resources if using only real-world data. To address this issue, driving scenario generation methods are developed and used more frequently, but the benefit of substituting generated data for real-world data has not yet been quantified. Additionally, the coverage of a set of concrete scenarios within a given logical scenario space has not been predicted yet. This paper proposes a methodology to quantify the cost-optimal usage of scenario generation approaches to reach a certainly complete scenario space coverage under given quality constraints and parametrization. Therefore, individual process steps for scenario generation and usage are investigated and evaluated using a meta model for the abstraction of knowledge-based and data-driven methods. Furthermore, a methodology is proposed to fit the meta model including the prediction of reachable complete coverage, quality criteria, and costs. Finally, the paper exemplary examines the suitability of a hybrid generation model under technical, economical, and quality constraints in comparison to different real-world scenario mining methods.
{"title":"Acquire Driving Scenarios Efficiently: A Framework for Prospective Assessment of Cost-Optimal Scenario Acquisition","authors":"Christoph Glasmacher, Michael Schuldes, Hendrik Weber, Nicolas Wagener, Lutz Eckstein","doi":"arxiv-2307.11647","DOIUrl":"https://doi.org/arxiv-2307.11647","url":null,"abstract":"Scenario-based testing is becoming increasingly important in safety assurance\u0000for automated driving. However, comprehensive and sufficiently complete\u0000coverage of the scenario space requires significant effort and resources if\u0000using only real-world data. To address this issue, driving scenario generation\u0000methods are developed and used more frequently, but the benefit of substituting\u0000generated data for real-world data has not yet been quantified. Additionally,\u0000the coverage of a set of concrete scenarios within a given logical scenario\u0000space has not been predicted yet. This paper proposes a methodology to quantify\u0000the cost-optimal usage of scenario generation approaches to reach a certainly\u0000complete scenario space coverage under given quality constraints and\u0000parametrization. Therefore, individual process steps for scenario generation\u0000and usage are investigated and evaluated using a meta model for the abstraction\u0000of knowledge-based and data-driven methods. Furthermore, a methodology is\u0000proposed to fit the meta model including the prediction of reachable complete\u0000coverage, quality criteria, and costs. Finally, the paper exemplary examines\u0000the suitability of a hybrid generation model under technical, economical, and\u0000quality constraints in comparison to different real-world scenario mining\u0000methods.","PeriodicalId":501310,"journal":{"name":"arXiv - CS - Other Computer Science","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-07-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138522014","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
As the autonomous vehicle industry continues to grow, various companies are exploring the use of aftermarket kits to retrofit existing vehicles with semi-autonomous capabilities. However, differences in implementation of the controller area network (CAN) used by each vehicle manufacturer poses a significant challenge to achieving large-scale implementation of retrofits. To address this challenge, this research proposes a method for reverse engineering the CAN channels associated with a vehicle's accelerator and brake pedals, without any prior knowledge of the vehicle. By simultaneously recording inertial measurement unit (IMU) and CAN data during vehicle operation, the proposed algorithms can identify the CAN channels that correspond to each control. During testing of six vehicles from three manufacturers, the proposed method was shown to successfully identify the CAN channels for the accelerator pedal and brake pedal for each vehicle tested. These promising results demonstrate the potential for using this approach for developing aftermarket autonomous vehicle kits - potentially with additional research to facilitate real-time use. Notably, the proposed system has the potential to maintain its effectiveness despite changes in vehicle CAN standards, and it could potentially be adapted to function with any vehicle communications medium.
{"title":"Development of an Autonomous Reverse Engineering Capability for Controller Area Network Messages to Support Autonomous Control Retrofits","authors":"Kevin Setterstrom, Jeremy Straub","doi":"arxiv-2307.11781","DOIUrl":"https://doi.org/arxiv-2307.11781","url":null,"abstract":"As the autonomous vehicle industry continues to grow, various companies are\u0000exploring the use of aftermarket kits to retrofit existing vehicles with\u0000semi-autonomous capabilities. However, differences in implementation of the\u0000controller area network (CAN) used by each vehicle manufacturer poses a\u0000significant challenge to achieving large-scale implementation of retrofits. To\u0000address this challenge, this research proposes a method for reverse engineering\u0000the CAN channels associated with a vehicle's accelerator and brake pedals,\u0000without any prior knowledge of the vehicle. By simultaneously recording\u0000inertial measurement unit (IMU) and CAN data during vehicle operation, the\u0000proposed algorithms can identify the CAN channels that correspond to each\u0000control. During testing of six vehicles from three manufacturers, the proposed\u0000method was shown to successfully identify the CAN channels for the accelerator\u0000pedal and brake pedal for each vehicle tested. These promising results\u0000demonstrate the potential for using this approach for developing aftermarket\u0000autonomous vehicle kits - potentially with additional research to facilitate\u0000real-time use. Notably, the proposed system has the potential to maintain its\u0000effectiveness despite changes in vehicle CAN standards, and it could\u0000potentially be adapted to function with any vehicle communications medium.","PeriodicalId":501310,"journal":{"name":"arXiv - CS - Other Computer Science","volume":"44 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-07-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138522110","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ioannis D. Apostolopoulos, Mpesi Tzani, Sokratis I. Aznaouridis
The fundamental principles, potential applications, and ethical concerns of ChatGPT are analyzed and discussed in this study. Since ChatGPT emerged, it has gained a rapidly growing popularity, with more than 600 million users today. The development of ChatGPT was a significant mile-stone, as it demonstrated the potential of large-scale language models to generate natural language responses that are almost indistinguishable from those of a human. ChatGPT's operational principles, prospective applications, and ability to advance a range of human endeavours are discussed in the paper. However, much of the work discusses and poses moral and other problems that rely on the subject. To document the latter, we submitted 14 queries and captured the ChatGPT responses. ChatGPT appeared to be honest, self-knowledgeable, and careful with its answers. The authors come to the realization that since AI is already a part of society, the pervasiveness of the ChatGPT tool to the general public has once again brought to light concerns regarding AI in general. Still, they have moved from the domain of scientific community collective reflection at a conceptual level to everyday practice this time.
{"title":"ChatGPT: ascertaining the self-evident. The use of AI in generating human knowledge","authors":"Ioannis D. Apostolopoulos, Mpesi Tzani, Sokratis I. Aznaouridis","doi":"arxiv-2308.06373","DOIUrl":"https://doi.org/arxiv-2308.06373","url":null,"abstract":"The fundamental principles, potential applications, and ethical concerns of\u0000ChatGPT are analyzed and discussed in this study. Since ChatGPT emerged, it has\u0000gained a rapidly growing popularity, with more than 600 million users today.\u0000The development of ChatGPT was a significant mile-stone, as it demonstrated the\u0000potential of large-scale language models to generate natural language responses\u0000that are almost indistinguishable from those of a human. ChatGPT's operational\u0000principles, prospective applications, and ability to advance a range of human\u0000endeavours are discussed in the paper. However, much of the work discusses and\u0000poses moral and other problems that rely on the subject. To document the\u0000latter, we submitted 14 queries and captured the ChatGPT responses. ChatGPT\u0000appeared to be honest, self-knowledgeable, and careful with its answers. The\u0000authors come to the realization that since AI is already a part of society, the\u0000pervasiveness of the ChatGPT tool to the general public has once again brought\u0000to light concerns regarding AI in general. Still, they have moved from the\u0000domain of scientific community collective reflection at a conceptual level to\u0000everyday practice this time.","PeriodicalId":501310,"journal":{"name":"arXiv - CS - Other Computer Science","volume":"216 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138542804","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}