首页 > 最新文献

Bulletin of Electrical Engineering and Informatics最新文献

英文 中文
Palembang songket fabric motif image detection with data augmentation based on ResNet using dropout 基于 ResNet 的 Palembang songket 织物图案图像检测与使用 dropout 的数据增强技术
Pub Date : 2024-06-01 DOI: 10.11591/eei.v13i3.6883
Ermatita Ermatita, Handrie Noprisson, Abdiansah Abdiansah
A good way to spread knowledge about Palembang songket woven cloth patterns is to use information technology, especially artificial intelligence technology. This study's main goal is to develop a ResNet model with dropout regularization methods and find out how dropout regularization affects the ResNet model for detecting Palembang songket fabric motif with more data. Data was collected in places like tujuh saudara songket, Zainal songket, songket PaSH, AMS songket, and batik, Ernawati songket, Nabilah collections, Ilham songket, and Marissa songket. We used eight class of data for this research. A dataset of 7,680 data for training, 960 data for validation, and 960 data for testing is a dataset that has been prepared to be implemented in experiments. In the final results, the experimental results for DResNet demonstrated that accuracy at the training stage was 92.16%, accuracy at the validation stage was 78.60%, and accuracy at the submission stage was 80.3%. The experimental results also show that dropouts are able to increase the accuracy of the ResNet model by adding +1.10% accuracy in the training process, adding +1.80% accuracy in the validation process, and adding +0.40% accuracy in the testing process.
利用信息技术,特别是人工智能技术,是传播有关巴伦邦歌德织布图案知识的好方法。本研究的主要目标是开发一个采用滤除正则化方法的 ResNet 模型,并利用更多数据找出滤除正则化对 ResNet 模型检测巴伦邦歌德布图案的影响。数据收集地点包括 tujuh saudara songket、Zainal songket、songket PaSH、AMS songket 和 batik、Ernawati songket、Nabilah collection、Ilham songket 和 Marissa songket。我们在这项研究中使用了八类数据。其中,7680 个数据用于训练,960 个数据用于验证,960 个数据用于测试。DResNet 的最终实验结果表明,训练阶段的准确率为 92.16%,验证阶段的准确率为 78.60%,提交阶段的准确率为 80.3%。实验结果还表明,Dropouts 能够提高 ResNet 模型的准确度,在训练过程中提高+1.10%的准确度,在验证过程中提高+1.80%的准确度,在测试过程中提高+0.40%的准确度。
{"title":"Palembang songket fabric motif image detection with data augmentation based on ResNet using dropout","authors":"Ermatita Ermatita, Handrie Noprisson, Abdiansah Abdiansah","doi":"10.11591/eei.v13i3.6883","DOIUrl":"https://doi.org/10.11591/eei.v13i3.6883","url":null,"abstract":"A good way to spread knowledge about Palembang songket woven cloth patterns is to use information technology, especially artificial intelligence technology. This study's main goal is to develop a ResNet model with dropout regularization methods and find out how dropout regularization affects the ResNet model for detecting Palembang songket fabric motif with more data. Data was collected in places like tujuh saudara songket, Zainal songket, songket PaSH, AMS songket, and batik, Ernawati songket, Nabilah collections, Ilham songket, and Marissa songket. We used eight class of data for this research. A dataset of 7,680 data for training, 960 data for validation, and 960 data for testing is a dataset that has been prepared to be implemented in experiments. In the final results, the experimental results for DResNet demonstrated that accuracy at the training stage was 92.16%, accuracy at the validation stage was 78.60%, and accuracy at the submission stage was 80.3%. The experimental results also show that dropouts are able to increase the accuracy of the ResNet model by adding +1.10% accuracy in the training process, adding +1.80% accuracy in the validation process, and adding +0.40% accuracy in the testing process.","PeriodicalId":502860,"journal":{"name":"Bulletin of Electrical Engineering and Informatics","volume":"2 4","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141229070","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
System interactive reader using eye-tracker technology in ebook reader 在电子书阅读器中使用眼动跟踪技术的系统交互式阅读器
Pub Date : 2024-06-01 DOI: 10.11591/eei.v13i3.5877
Herry Sujaini, Novi Safriadi, Dian Khairiyah
Interest in using ebooks by the academic community is very high. Still, there is a problem when readers are reading through screens, tend to read fast, only scan the necessary parts, and don't focus on paying attention to the content they read, so this reduces the quality of reading because readers don't study the overall meaning of the sentence. Hence, this research aims to build an interactive reader system by integrating eye tracker technology with a webcam which is expected to solve the problem of decreasing the quality of reading through the screen by helping readers stay focused on their reading and providing an interactive system that makes it easier for readers to control the computer while reading. This research adopts the waterfall method and is divided into six stages. The system is designed using class diagrams, use case diagrams, and activity diagrams. Also, the system is built using the Python language with the Django framework. Then, the interactive reader system was tested using black box testing and usability testing methods. Based on the test results, it is shown that the interactive reader system that was built can help improve the quality and concentration when reading activities take place.
学术界对使用电子书的兴趣很高。但问题是,当读者通过屏幕进行阅读时,往往阅读速度较快,只扫描必要的部分,而不会集中精力关注阅读的内容,这样就降低了阅读质量,因为读者不会研究句子的整体含义。因此,本研究旨在通过将眼动仪技术与网络摄像头结合起来,建立一个交互式阅读系统,通过帮助读者在阅读时保持注意力集中,并提供一个交互式系统,使读者在阅读时更容易控制计算机,从而解决隔着屏幕阅读质量下降的问题。本研究采用瀑布法,分为六个阶段。系统设计使用了类图、用例图和活动图。此外,还使用 Python 语言和 Django 框架构建了系统。然后,使用黑盒测试和可用性测试方法对交互式阅读器系统进行了测试。测试结果表明,所构建的交互式阅读器系统有助于提高阅读活动的质量和注意力。
{"title":"System interactive reader using eye-tracker technology in ebook reader","authors":"Herry Sujaini, Novi Safriadi, Dian Khairiyah","doi":"10.11591/eei.v13i3.5877","DOIUrl":"https://doi.org/10.11591/eei.v13i3.5877","url":null,"abstract":"Interest in using ebooks by the academic community is very high. Still, there is a problem when readers are reading through screens, tend to read fast, only scan the necessary parts, and don't focus on paying attention to the content they read, so this reduces the quality of reading because readers don't study the overall meaning of the sentence. Hence, this research aims to build an interactive reader system by integrating eye tracker technology with a webcam which is expected to solve the problem of decreasing the quality of reading through the screen by helping readers stay focused on their reading and providing an interactive system that makes it easier for readers to control the computer while reading. This research adopts the waterfall method and is divided into six stages. The system is designed using class diagrams, use case diagrams, and activity diagrams. Also, the system is built using the Python language with the Django framework. Then, the interactive reader system was tested using black box testing and usability testing methods. Based on the test results, it is shown that the interactive reader system that was built can help improve the quality and concentration when reading activities take place.","PeriodicalId":502860,"journal":{"name":"Bulletin of Electrical Engineering and Informatics","volume":"7 21","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141229352","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A discernment of round-robin vs SD-WAN load-balancing performance for campus area network 校园区域网络轮循与 SD-WAN 负载平衡性能对比分析
Pub Date : 2024-06-01 DOI: 10.11591/eei.v13i3.5945
Anazel P. Gamilla, Anjela C. Tolentino, Reina T. Payongayong
Efficient load balancing is crucial for optimizing network performance and ensuring seamless connectivity in modern campus area networks (CANs). With the proliferation of data-intensive applications and the increasing reliance on cloud-based services, organizations are seeking effective load-balancing solutions to distribute network traffic evenly across available resources. The continuous improvement of devices, tools, and techniques to cater a large amount of network traffic, started to be employed on different campuses. Understanding the best approach to maximize the utilization of the network resources is crucial in order to stabilize and maintain the network. The study aims to discern the round-robin and software defined-wide area network (SD-WAN) techniques based on defined metrics and conducted with a predefined payload for commonly used application conditions. The analysis shows that SD-WAN delivers a much superior performance than round-robin based on the criteria. The local area network (LAN) test shows difference between the two types of technology for the three given metrics. The WAN test shows that the round-robin has higher packet loss, latency, and jitter than the SD-WAN technology. While round-robin may suffice for small-scale deployments with relatively homogeneous traffic patterns, SD-WAN offers more sophisticated capabilities for larger CANs with diverse application workloads and distributed locations.
高效的负载平衡对于优化网络性能和确保现代园区区域网络(CAN)的无缝连接至关重要。随着数据密集型应用的激增和对基于云的服务的日益依赖,企业正在寻求有效的负载平衡解决方案,以便在可用资源之间平均分配网络流量。为满足大量网络流量的需求,设备、工具和技术不断改进,并开始在不同的校园使用。为了稳定和维护网络,了解最大限度地利用网络资源的最佳方法至关重要。本研究旨在根据定义的指标,对循环和软件定义广域网(SD-WAN)技术进行鉴别,并针对常用的应用条件使用预定义的有效载荷。分析表明,根据标准,SD-WAN 的性能远远优于轮循技术。局域网(LAN)测试显示了两种技术在三个给定指标上的差异。广域网测试表明,轮循技术的丢包、延迟和抖动都高于 SD-WAN 技术。对于流量模式相对单一的小规模部署来说,轮循技术已经足够,而对于具有不同应用工作负载和分布式地点的大型 CAN 来说,SD-WAN 能提供更复杂的功能。
{"title":"A discernment of round-robin vs SD-WAN load-balancing performance for campus area network","authors":"Anazel P. Gamilla, Anjela C. Tolentino, Reina T. Payongayong","doi":"10.11591/eei.v13i3.5945","DOIUrl":"https://doi.org/10.11591/eei.v13i3.5945","url":null,"abstract":"Efficient load balancing is crucial for optimizing network performance and ensuring seamless connectivity in modern campus area networks (CANs). With the proliferation of data-intensive applications and the increasing reliance on cloud-based services, organizations are seeking effective load-balancing solutions to distribute network traffic evenly across available resources. The continuous improvement of devices, tools, and techniques to cater a large amount of network traffic, started to be employed on different campuses. Understanding the best approach to maximize the utilization of the network resources is crucial in order to stabilize and maintain the network. The study aims to discern the round-robin and software defined-wide area network (SD-WAN) techniques based on defined metrics and conducted with a predefined payload for commonly used application conditions. The analysis shows that SD-WAN delivers a much superior performance than round-robin based on the criteria. The local area network (LAN) test shows difference between the two types of technology for the three given metrics. The WAN test shows that the round-robin has higher packet loss, latency, and jitter than the SD-WAN technology. While round-robin may suffice for small-scale deployments with relatively homogeneous traffic patterns, SD-WAN offers more sophisticated capabilities for larger CANs with diverse application workloads and distributed locations.","PeriodicalId":502860,"journal":{"name":"Bulletin of Electrical Engineering and Informatics","volume":"6 12","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141230220","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Compact dual-band antenna design for sub-6 GHz 5G application 用于 6GHz 以下 5G 应用的紧凑型双频天线设计
Pub Date : 2024-06-01 DOI: 10.11591/eei.v13i3.7521
Mahesh Kadu, Ramesh Pawase, Pankaj Chitte, V. Ubale
A design of a compact dual-band antenna for 5G application is presented in this research article. The dual-band operation includes the 3.6 GHz and 5.4 GHz frequency bands of the sub-6 GHz frequency band for 5G technology. The proposed antenna offers a compact design with satisfactory antenna performance parameters. Moreover, the dual-band antenna showcases the independent tuning ability for both frequency bands. The prototype of the dual-band antenna is manufactured and when tested for various antenna performance parameters shows a good agreement between the simulated and measured results. The proposed dual-band antenna has compact dimensions along with a peak gain of 2.2 dB and antenna efficiency of more than 90%.The antenna performance parameters are also compared with various dual-band antenna designs from the literature. The proposed dual-band antenna offers a compact design with satisfactory performance parameters and outperforms its counterparts.
本研究文章介绍了一种用于 5G 应用的紧凑型双频天线的设计。双频操作包括 5G 技术 6 GHz 以下频段中的 3.6 GHz 和 5.4 GHz 频段。所提出的天线设计紧凑,天线性能参数令人满意。此外,双频天线还展示了两个频段的独立调谐能力。双频天线的原型已制造完成,在对各种天线性能参数进行测试时,模拟结果和测量结果显示出良好的一致性。拟议的双频天线尺寸小巧,峰值增益为 2.2 dB,天线效率超过 90%。天线性能参数还与文献中的各种双频天线设计进行了比较。所提出的双频天线设计紧凑,性能参数令人满意,并优于同类产品。
{"title":"Compact dual-band antenna design for sub-6 GHz 5G application","authors":"Mahesh Kadu, Ramesh Pawase, Pankaj Chitte, V. Ubale","doi":"10.11591/eei.v13i3.7521","DOIUrl":"https://doi.org/10.11591/eei.v13i3.7521","url":null,"abstract":"A design of a compact dual-band antenna for 5G application is presented in this research article. The dual-band operation includes the 3.6 GHz and 5.4 GHz frequency bands of the sub-6 GHz frequency band for 5G technology. The proposed antenna offers a compact design with satisfactory antenna performance parameters. Moreover, the dual-band antenna showcases the independent tuning ability for both frequency bands. The prototype of the dual-band antenna is manufactured and when tested for various antenna performance parameters shows a good agreement between the simulated and measured results. The proposed dual-band antenna has compact dimensions along with a peak gain of 2.2 dB and antenna efficiency of more than 90%.The antenna performance parameters are also compared with various dual-band antenna designs from the literature. The proposed dual-band antenna offers a compact design with satisfactory performance parameters and outperforms its counterparts.","PeriodicalId":502860,"journal":{"name":"Bulletin of Electrical Engineering and Informatics","volume":"4 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141230614","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Long-term performance analysis of operational efficiency of a grid-connected solar power plant under Mauritania climate 毛里塔尼亚气候条件下并网太阳能电站运行效率的长期性能分析
Pub Date : 2024-06-01 DOI: 10.11591/eei.v13i3.7092
Issa Cheikh Elhassene, Bamba El Heiba, Teyeb Med Mahmoud, Zoubir Aoulmi, Issakha Youm, Abdelkader Mahmoud
This work examines a solar power plant connected to the Nouakchott electricity grid in Mauritania. Operating since 2013, the 15 MWp plant's reliability and energy yield have been evaluated using a performance index. The assessment involves three phases. First, the plant's meteorological environment and technical indicators are presented. In the second phase, mathematical performance models specified by the International Energy Agency (IEA) are applied to calculate performance indices using data from the data acquisition system (SCADA). The third phase compares actual production data for 2015, 2017, and 2020 with results simulated for PVsyst for the same years. The obtained results are thoroughly analyzed to highlight relevant physical phenomena. The analysis focuses on the plant's 7-year operating period and its impact on performance indicators for electricity production fed into the grid. This study provides insights into the solar power plant's reliability and energy yield, aiding future operational enhancements. It underscores the importance of performance monitoring and assessment in optimizing solar power generation systems.
这项研究考察了与毛里塔尼亚努瓦克肖特电网相连的太阳能发电厂。该 15 兆瓦电站自 2013 年开始运行,其可靠性和发电量已通过性能指标进行了评估。评估包括三个阶段。首先,介绍发电厂的气象环境和技术指标。第二阶段,采用国际能源机构(IEA)规定的数学性能模型,利用数据采集系统(SCADA)的数据计算性能指数。第三阶段将 2015 年、2017 年和 2020 年的实际生产数据与同年的 PVsyst 模拟结果进行比较。对获得的结果进行全面分析,以突出相关的物理现象。分析的重点是电站的 7 年运营期及其对并入电网的电力生产性能指标的影响。这项研究为太阳能发电厂的可靠性和发电量提供了深入的见解,有助于未来的运营改进。它强调了性能监测和评估对优化太阳能发电系统的重要性。
{"title":"Long-term performance analysis of operational efficiency of a grid-connected solar power plant under Mauritania climate","authors":"Issa Cheikh Elhassene, Bamba El Heiba, Teyeb Med Mahmoud, Zoubir Aoulmi, Issakha Youm, Abdelkader Mahmoud","doi":"10.11591/eei.v13i3.7092","DOIUrl":"https://doi.org/10.11591/eei.v13i3.7092","url":null,"abstract":"This work examines a solar power plant connected to the Nouakchott electricity grid in Mauritania. Operating since 2013, the 15 MWp plant's reliability and energy yield have been evaluated using a performance index. The assessment involves three phases. First, the plant's meteorological environment and technical indicators are presented. In the second phase, mathematical performance models specified by the International Energy Agency (IEA) are applied to calculate performance indices using data from the data acquisition system (SCADA). The third phase compares actual production data for 2015, 2017, and 2020 with results simulated for PVsyst for the same years. The obtained results are thoroughly analyzed to highlight relevant physical phenomena. The analysis focuses on the plant's 7-year operating period and its impact on performance indicators for electricity production fed into the grid. This study provides insights into the solar power plant's reliability and energy yield, aiding future operational enhancements. It underscores the importance of performance monitoring and assessment in optimizing solar power generation systems.","PeriodicalId":502860,"journal":{"name":"Bulletin of Electrical Engineering and Informatics","volume":"47 3","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141231544","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Bangla handwritten word recognition using YOLO V5 使用 YOLO V5 识别孟加拉语手写单词
Pub Date : 2024-06-01 DOI: 10.11591/eei.v13i3.6953
Md. Anwar Hossain, A. Abadin, Md. Omar Faruk, Iffat Ara, Mirza Afm Rashidul Hasan, Nafiul Fatta, Md Asraful, Ebrahim Hossen
This research paper presents an innovative solution for offline handwritten word recognition in Bengali, a prominent Indic language. The complexities of this script, particularly in cursive writing, often lead to overlapping characters and segmentation challenges. Conventional methodologies, reliant on individual character recognition and aggregation, are error-prone. To overcome these limitations, we propose a novel method treating the entire document as a coherent entity and utilizing the efficient you only look once (YOLO) model for word extraction. In our approach, we view individual words as distinct objects and employ the YOLO model for supervised learning, transforming object detection into a regression problematic to predict spatially detached bounding boxes and class possibilities. Rigorous training results in outstanding performance, with remarkable box_loss of 0.014, obj_loss of 0.14, and class_loss of 0.009. Furthermore, the achieved mAP_0.5 score of 0.95 and map_0.5:0.95 score of 0.97 demonstrates the model’s exceptional accuracy in detecting and recognizing handwritten words. To evaluate our method comprehensively, we introduce the Omor-Ekush dataset, a meticulously curated collection of 21,300 handwritten words from 150 participants, featuring 141 words per document. Our pioneering YOLO-based approach, combined with the curated Omor-Ekush dataset, represents a significant advancement in handwritten word recognition in Bengali.
本研究论文提出了一种创新解决方案,用于离线识别孟加拉语(一种著名的印度语言)中的手写单词。这种文字的复杂性,尤其是在草书书写中,经常导致字符重叠和分割难题。传统方法依赖于单个字符识别和聚合,容易出错。为了克服这些局限性,我们提出了一种新颖的方法,将整个文档视为一个连贯的实体,并利用高效的 "只看一遍"(YOLO)模型进行单词提取。在我们的方法中,我们将单个词视为不同的对象,并利用 YOLO 模型进行监督学习,将对象检测转化为回归问题,以预测空间上分离的边界框和类的可能性。严格的训练带来了出色的性能,显著的 box_loss 为 0.014,obj_loss 为 0.14,class_loss 为 0.009。此外,mAP_0.5 得分为 0.95,map_0.5:0.95 得分为 0.97,这表明该模型在检测和识别手写单词方面具有极高的准确性。为了全面评估我们的方法,我们引入了 Omor-Ekush 数据集,该数据集经过精心策划,收集了来自 150 名参与者的 21,300 个手写单词,每个文档包含 141 个单词。我们开创的基于 YOLO 的方法与 Omor-Ekush 数据集相结合,代表了孟加拉语手写单词识别领域的重大进步。
{"title":"Bangla handwritten word recognition using YOLO V5","authors":"Md. Anwar Hossain, A. Abadin, Md. Omar Faruk, Iffat Ara, Mirza Afm Rashidul Hasan, Nafiul Fatta, Md Asraful, Ebrahim Hossen","doi":"10.11591/eei.v13i3.6953","DOIUrl":"https://doi.org/10.11591/eei.v13i3.6953","url":null,"abstract":"This research paper presents an innovative solution for offline handwritten word recognition in Bengali, a prominent Indic language. The complexities of this script, particularly in cursive writing, often lead to overlapping characters and segmentation challenges. Conventional methodologies, reliant on individual character recognition and aggregation, are error-prone. To overcome these limitations, we propose a novel method treating the entire document as a coherent entity and utilizing the efficient you only look once (YOLO) model for word extraction. In our approach, we view individual words as distinct objects and employ the YOLO model for supervised learning, transforming object detection into a regression problematic to predict spatially detached bounding boxes and class possibilities. Rigorous training results in outstanding performance, with remarkable box_loss of 0.014, obj_loss of 0.14, and class_loss of 0.009. Furthermore, the achieved mAP_0.5 score of 0.95 and map_0.5:0.95 score of 0.97 demonstrates the model’s exceptional accuracy in detecting and recognizing handwritten words. To evaluate our method comprehensively, we introduce the Omor-Ekush dataset, a meticulously curated collection of 21,300 handwritten words from 150 participants, featuring 141 words per document. Our pioneering YOLO-based approach, combined with the curated Omor-Ekush dataset, represents a significant advancement in handwritten word recognition in Bengali.","PeriodicalId":502860,"journal":{"name":"Bulletin of Electrical Engineering and Informatics","volume":"32 7","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141234293","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Smart irrigation with crop recommendation using machine learning approach 利用机器学习方法推荐作物的智能灌溉
Pub Date : 2024-06-01 DOI: 10.11591/eei.v13i3.6103
Anitha Palakshappa, Sowmya Kyathanahalli Nanjappa, Punitha Mahadevappa, Sinchana Sinchana
Increasing crop yield with sustainable growth is the primary requirement for farmers with a growing population. Effective management and conservation of depleting natural resources is a priority task. Decrease in manpower due to migrating population has forced automation in agriculture. In this work, an automatic water irrigation and an effective crop recommendation system is proposed. Gypsum blocks based soil sensor is used to measure dielectric permittivity associated with the tested soil. The water-potential present in soil, along with potassium (K), nitrogen (N), phosphorus (P), potential of hydrogen (pH) helps to quantify the soil nutrients available and the suitable crop that can be considered for harvesting in a specified demography and environment. Sensory data indicating soil quality obtained is used to recommend crops by utilizing machine learning approaches. Telegram application is linked to the recommendation model to assist decision making and to ensure farmer-friendliness by sending notifications periodically.
随着人口的不断增长,提高作物产量并实现可持续增长是农民的首要要求。有效管理和保护日益枯竭的自然资源是首要任务。人口迁移导致的人力减少迫使农业实现自动化。在这项工作中,提出了一种自动灌溉和有效作物推荐系统。基于石膏块的土壤传感器用于测量与测试土壤相关的介电常数。土壤中存在的水势以及钾(K)、氮(N)、磷(P)和氢势(pH)有助于量化土壤中可用的养分以及在特定的人口和环境中可考虑收获的合适作物。表明土壤质量的感官数据可用于利用机器学习方法推荐作物。Telegram 应用程序与推荐模型相连,以协助决策,并通过定期发送通知确保对农民的友好性。
{"title":"Smart irrigation with crop recommendation using machine learning approach","authors":"Anitha Palakshappa, Sowmya Kyathanahalli Nanjappa, Punitha Mahadevappa, Sinchana Sinchana","doi":"10.11591/eei.v13i3.6103","DOIUrl":"https://doi.org/10.11591/eei.v13i3.6103","url":null,"abstract":"Increasing crop yield with sustainable growth is the primary requirement for farmers with a growing population. Effective management and conservation of depleting natural resources is a priority task. Decrease in manpower due to migrating population has forced automation in agriculture. In this work, an automatic water irrigation and an effective crop recommendation system is proposed. Gypsum blocks based soil sensor is used to measure dielectric permittivity associated with the tested soil. The water-potential present in soil, along with potassium (K), nitrogen (N), phosphorus (P), potential of hydrogen (pH) helps to quantify the soil nutrients available and the suitable crop that can be considered for harvesting in a specified demography and environment. Sensory data indicating soil quality obtained is used to recommend crops by utilizing machine learning approaches. Telegram application is linked to the recommendation model to assist decision making and to ensure farmer-friendliness by sending notifications periodically.","PeriodicalId":502860,"journal":{"name":"Bulletin of Electrical Engineering and Informatics","volume":"29 24","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141232838","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A novel method of detecting malware on Android mobile devices with explainable artificial intelligence 利用可解释人工智能检测安卓移动设备恶意软件的新方法
Pub Date : 2024-06-01 DOI: 10.11591/eei.v13i3.6986
S. Vanjire, Mohandoss Lakshmi
The increasing prevalence of malware targeting android mobile devices has raised significant concerns regarding user privacy and security. In response, effective methods for malware classification and detection are crucial to protect users from malicious applications. This paper presents an approach that leverages deep learning techniques and explainable artificial intelligence (XAI) for android mobile malware classification and detection. Convolutional neural networks (CNNs) are deep learning model that has shown impressive performance in several application areas, including image and text classification. In the context of android mobile malware, CNNs have shown promising results in capturing intricate patterns and features inherent in malware samples. By training these models on large datasets of benign and malicious applications, accurate classification can be achieved. To enhance transparency and interpretability, XAI techniques are integrated into the classification process. These techniques provide insights into the decision-making process of the deep learning models, enabling the identification of critical features and characteristics that contribute to the classification results. This research, by combining deep learning and XAI methods, presents a fresh strategy for identifying and categorizing Android malware. This research paper will focus on a fascinating CNN-based malware categorization technique.
针对安卓移动设备的恶意软件日益猖獗,引起了人们对用户隐私和安全的极大关注。为此,有效的恶意软件分类和检测方法对于保护用户免受恶意应用程序的侵害至关重要。本文介绍了一种利用深度学习技术和可解释人工智能(XAI)进行安卓移动恶意软件分类和检测的方法。卷积神经网络(CNN)是一种深度学习模型,在图像和文本分类等多个应用领域都表现出令人印象深刻的性能。在安卓手机恶意软件方面,卷积神经网络在捕捉恶意软件样本中固有的复杂模式和特征方面取得了可喜的成果。通过在良性和恶意应用程序的大型数据集上训练这些模型,可以实现准确的分类。为了提高透明度和可解释性,XAI 技术被集成到了分类过程中。这些技术可深入了解深度学习模型的决策过程,从而识别有助于分类结果的关键特征和特性。这项研究结合了深度学习和 XAI 方法,为识别和分类安卓恶意软件提出了一种全新的策略。本研究论文将重点介绍一种令人着迷的基于 CNN 的恶意软件分类技术。
{"title":"A novel method of detecting malware on Android mobile devices with explainable artificial intelligence","authors":"S. Vanjire, Mohandoss Lakshmi","doi":"10.11591/eei.v13i3.6986","DOIUrl":"https://doi.org/10.11591/eei.v13i3.6986","url":null,"abstract":"The increasing prevalence of malware targeting android mobile devices has raised significant concerns regarding user privacy and security. In response, effective methods for malware classification and detection are crucial to protect users from malicious applications. This paper presents an approach that leverages deep learning techniques and explainable artificial intelligence (XAI) for android mobile malware classification and detection. Convolutional neural networks (CNNs) are deep learning model that has shown impressive performance in several application areas, including image and text classification. In the context of android mobile malware, CNNs have shown promising results in capturing intricate patterns and features inherent in malware samples. By training these models on large datasets of benign and malicious applications, accurate classification can be achieved. To enhance transparency and interpretability, XAI techniques are integrated into the classification process. These techniques provide insights into the decision-making process of the deep learning models, enabling the identification of critical features and characteristics that contribute to the classification results. This research, by combining deep learning and XAI methods, presents a fresh strategy for identifying and categorizing Android malware. This research paper will focus on a fascinating CNN-based malware categorization technique.","PeriodicalId":502860,"journal":{"name":"Bulletin of Electrical Engineering and Informatics","volume":"31 7","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141234789","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Refining disparity maps using deep learning and edge-aware smoothing filter 利用深度学习和边缘感知平滑滤波器完善差异图
Pub Date : 2024-06-01 DOI: 10.11591/eei.v13i3.6480
Shamsul Fakhar Abd Gani, M. F. Miskon, R. A. Hamzah, M. Hamid, A. F. Kadmin, A. I. Herman
Stereo matching algorithm is crucial for applications that rely on three-dimensional (3D) surface reconstruction, producing a disparity map that contains depth information by computing the disparity values between corresponding points from a stereo image pair. In order to yield desirable results, the proposed stereo matching algorithm must possess a high degree of resilience against radiometric variation and edge inconsistencies. In this article convolutional neural network (CNN) is employed in the first stage to generate the raw matching cost, which is subsequently filtered with a bilateral filter (BF) and applied with cross-based cost aggregation (CBCA) during the cost aggregation stage to enhance precision. Winner-take-all (WTA) strategy is implemented to normalise the disparity map values. Finally, the resulting output is subjected to an edge-aware smoothing filter (EASF) to reduce the noise. Due to its resistance to high contrast and brightness, the filter is found to be effective in refining and eliminating noise from the output image. Despite discontinuities like adiron's lost cup handle or artl's shattered rods, this approach, based on experimental research utilizing a Middlebury standard validation benchmark, yields a high level of accuracy, with an average non-occluded error of 6.79%, comparable to other published methods.
立体匹配算法对于依赖三维(3D)表面重建的应用至关重要,它通过计算立体图像对中相应点之间的差异值,生成包含深度信息的差异图。为了获得理想的结果,所提出的立体匹配算法必须具有很强的抗辐射变化和边缘不一致的能力。本文在第一阶段使用卷积神经网络(CNN)生成原始匹配成本,然后使用双边滤波器(BF)对其进行过滤,并在成本聚合阶段使用基于交叉的成本聚合(CBCA)来提高精度。采用胜者为王(WTA)策略对差异图值进行归一化处理。最后,对输出结果进行边缘感知平滑滤波器(EASF)处理,以减少噪声。由于该滤波器对高对比度和高亮度有很强的抵抗力,因此能有效地细化和消除输出图像中的噪声。尽管存在不连续性,如 adiron 丢失的杯子手柄或 artl 粉碎的棒子,但基于利用米德尔伯里标准验证基准进行的实验研究,这种方法产生了很高的准确性,平均非排除误差为 6.79%,与其他已公布的方法相当。
{"title":"Refining disparity maps using deep learning and edge-aware smoothing filter","authors":"Shamsul Fakhar Abd Gani, M. F. Miskon, R. A. Hamzah, M. Hamid, A. F. Kadmin, A. I. Herman","doi":"10.11591/eei.v13i3.6480","DOIUrl":"https://doi.org/10.11591/eei.v13i3.6480","url":null,"abstract":"Stereo matching algorithm is crucial for applications that rely on three-dimensional (3D) surface reconstruction, producing a disparity map that contains depth information by computing the disparity values between corresponding points from a stereo image pair. In order to yield desirable results, the proposed stereo matching algorithm must possess a high degree of resilience against radiometric variation and edge inconsistencies. In this article convolutional neural network (CNN) is employed in the first stage to generate the raw matching cost, which is subsequently filtered with a bilateral filter (BF) and applied with cross-based cost aggregation (CBCA) during the cost aggregation stage to enhance precision. Winner-take-all (WTA) strategy is implemented to normalise the disparity map values. Finally, the resulting output is subjected to an edge-aware smoothing filter (EASF) to reduce the noise. Due to its resistance to high contrast and brightness, the filter is found to be effective in refining and eliminating noise from the output image. Despite discontinuities like adiron's lost cup handle or artl's shattered rods, this approach, based on experimental research utilizing a Middlebury standard validation benchmark, yields a high level of accuracy, with an average non-occluded error of 6.79%, comparable to other published methods.","PeriodicalId":502860,"journal":{"name":"Bulletin of Electrical Engineering and Informatics","volume":"7 11","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141234116","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An extreme gradient boost based classification and regression tree for network intrusion detection in IoT 基于极端梯度提升的分类和回归树,用于物联网网络入侵检测
Pub Date : 2024-06-01 DOI: 10.11591/eei.v13i3.6843
Silpa Chalichalamala, Niranjana Govindan, Ramani Kasarapu
Nowadays, modern technology includes various devices, networks, and apps from the internet of things (IoT), which consist of both positive and negative impacts on social, economic, and industrial effects. To address these issues, IoT applications and networks require lightweight, quick, and adaptable security solutions. In this sense, solutions based on artificial intelligence and big data analytics can yield positive outcomes in the realm of cyber security. This study presents a method called extreme gradient boost (XGBoost) based classification and regression tree to identify network intrusions in the IoT. This model is ideally suited for application in IoT networks with restricted resource availability because of its distributed structure and builtin higher generalization capabilities. This approach is thoroughly tested using botnet internet of things (BoT-IoT) new-generation IoT security datasets. All trials are conducted in a range of different settings, and a number of performance indicators are used to evaluate the effectiveness of the proposed method. The suggested study's findings provide recommendations and insights for situations involving binary classes and numerous classes. The suggested XGBoost model achieved 99.53% of accuracy in attack detection and 99.51% in precision for binary class and multiclass classifications, respectively.
如今,现代技术包括物联网(IoT)中的各种设备、网络和应用程序,对社会、经济和工业产生了积极和消极的影响。为了解决这些问题,物联网应用和网络需要轻量级、快速和适应性强的安全解决方案。从这个意义上说,基于人工智能和大数据分析的解决方案可以在网络安全领域产生积极的成果。本研究提出了一种基于极端梯度提升(XGBoost)分类和回归树的方法,用于识别物联网中的网络入侵。由于其分布式结构和内置的更高泛化能力,该模型非常适合应用于资源有限的物联网网络。该方法使用僵尸网络物联网(BoT-IoT)新一代物联网安全数据集进行了全面测试。所有试验都是在一系列不同的环境中进行的,并使用了一系列性能指标来评估所建议方法的有效性。建议的研究结果为涉及二元类和众多类的情况提供了建议和见解。建议的 XGBoost 模型在二元类和多类分类中的攻击检测准确率和精确率分别达到了 99.53% 和 99.51%。
{"title":"An extreme gradient boost based classification and regression tree for network intrusion detection in IoT","authors":"Silpa Chalichalamala, Niranjana Govindan, Ramani Kasarapu","doi":"10.11591/eei.v13i3.6843","DOIUrl":"https://doi.org/10.11591/eei.v13i3.6843","url":null,"abstract":"Nowadays, modern technology includes various devices, networks, and apps from the internet of things (IoT), which consist of both positive and negative impacts on social, economic, and industrial effects. To address these issues, IoT applications and networks require lightweight, quick, and adaptable security solutions. In this sense, solutions based on artificial intelligence and big data analytics can yield positive outcomes in the realm of cyber security. This study presents a method called extreme gradient boost (XGBoost) based classification and regression tree to identify network intrusions in the IoT. This model is ideally suited for application in IoT networks with restricted resource availability because of its distributed structure and builtin higher generalization capabilities. This approach is thoroughly tested using botnet internet of things (BoT-IoT) new-generation IoT security datasets. All trials are conducted in a range of different settings, and a number of performance indicators are used to evaluate the effectiveness of the proposed method. The suggested study's findings provide recommendations and insights for situations involving binary classes and numerous classes. The suggested XGBoost model achieved 99.53% of accuracy in attack detection and 99.51% in precision for binary class and multiclass classifications, respectively.","PeriodicalId":502860,"journal":{"name":"Bulletin of Electrical Engineering and Informatics","volume":"42 15","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141232728","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Bulletin of Electrical Engineering and Informatics
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1