首页 > 最新文献

Bulletin of Electrical Engineering and Informatics最新文献

英文 中文
The role of chat generative pre-trained transformer in facilitating decision-making and the e-learning process in higher education 聊天生成式预培训转换器在促进高等教育决策和电子学习过程中的作用
Pub Date : 2024-06-01 DOI: 10.11591/eei.v13i3.7237
Khaldun G. Al-Moghrabi, Ali M. Al-Ghonmein
Digital technology and artificial intelligence technologies have been progressing rapidly, thus giving rise to intelligent chatbots such as chat generative pre-trained transformer (ChatGPT). These chatbots make searching for information more efficient and provide higher education institutions with assistance in decision-making. The goal of this research is to explore the capabilities of ChatGPT technology and its role in enhancing the e-learning process. Moreover, it seeks to determine whether ChatGPT can provide useful suggestions to improve the decision-making process in higher education. ChatGPT is effective in an e-learning environment for the following reasons: it facilitates personalized learning experiences, offers real-time support, and enhances decision-making by leveraging natural language processing capabilities. As suggested by the findings, ChatGPT has significant potential in higher education, as demonstrated by its ability to improve interactive participation, educational strategies, and educational outcomes. This study highlights the importance of incorporating ChatGPT into higher education settings to improve e-learning and decision-making.
数字技术和人工智能技术飞速发展,催生了聊天生成预训练转换器(ChatGPT)等智能聊天机器人。这些聊天机器人提高了信息搜索的效率,为高等教育机构的决策提供了帮助。本研究的目标是探索 ChatGPT 技术的能力及其在加强电子学习过程中的作用。此外,它还试图确定 ChatGPT 是否能为改进高等教育决策过程提供有用的建议。ChatGPT 在电子学习环境中是有效的,原因如下:它促进了个性化学习体验,提供了实时支持,并通过利用自然语言处理能力增强了决策能力。研究结果表明,ChatGPT 在高等教育中具有巨大的潜力,这体现在它能够改善互动参与、教育策略和教育成果。这项研究强调了将 ChatGPT 纳入高等教育环境以改善电子学习和决策的重要性。
{"title":"The role of chat generative pre-trained transformer in facilitating decision-making and the e-learning process in higher education","authors":"Khaldun G. Al-Moghrabi, Ali M. Al-Ghonmein","doi":"10.11591/eei.v13i3.7237","DOIUrl":"https://doi.org/10.11591/eei.v13i3.7237","url":null,"abstract":"Digital technology and artificial intelligence technologies have been progressing rapidly, thus giving rise to intelligent chatbots such as chat generative pre-trained transformer (ChatGPT). These chatbots make searching for information more efficient and provide higher education institutions with assistance in decision-making. The goal of this research is to explore the capabilities of ChatGPT technology and its role in enhancing the e-learning process. Moreover, it seeks to determine whether ChatGPT can provide useful suggestions to improve the decision-making process in higher education. ChatGPT is effective in an e-learning environment for the following reasons: it facilitates personalized learning experiences, offers real-time support, and enhances decision-making by leveraging natural language processing capabilities. As suggested by the findings, ChatGPT has significant potential in higher education, as demonstrated by its ability to improve interactive participation, educational strategies, and educational outcomes. This study highlights the importance of incorporating ChatGPT into higher education settings to improve e-learning and decision-making.","PeriodicalId":502860,"journal":{"name":"Bulletin of Electrical Engineering and Informatics","volume":"63 38","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141277193","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Risk analysis and prevention in computer security in institutional servers, a systematic review of the literature 机构服务器计算机安全的风险分析和预防,文献系统回顾
Pub Date : 2024-06-01 DOI: 10.11591/eei.v13i3.6093
Angel Namo-Ochoa, Eduardo Portilla-Cosar, Fernando Sierra-Liñan, M. Cabanillas-Carbonell
In recent years, computer attacks on the server infrastructure in organizations have been increasing, and the pandemic of covid-19 and remote work have been the main causes for this massive wave of large-scale attacks, small businesses are especially vulnerable because to optimizing resources they leave aside the cyber security in their network infrastructure. The present research is a systematic review that compiles 58 articles where policies, techniques, and infrastructure for the prevention of threats in enterprise servers have been implemented and raised, these articles have been collected from major databases such as IEEE Xplore, SAGE, Science Direct, Scopus, and IOP Publishing. The results show that one of the most effective methods in preventing communications between institutional servers is public key infrastructure/SSL-TLS encryption. Most research claims that it is the most effective method as it provides a central certifier and manages the certificates for the servers allowing each of the modules or attachments within the infrastructure to identify and validate other members and to proceed with the encryption of network traffic, Finally, a security implementation model is proposed.
近年来,针对企业服务器基础设施的计算机攻击日益增多,而covid-19和远程工作的流行是造成这一大规模攻击浪潮的主要原因,小企业尤其容易受到攻击,因为它们为了优化资源而将网络基础设施的网络安全问题抛在了一边。本研究是一项系统性综述,汇编了 58 篇文章,这些文章中提出并实施了预防企业服务器威胁的政策、技术和基础设施,这些文章是从 IEEE Xplore、SAGE、Science Direct、Scopus 和 IOP Publishing 等主要数据库中收集的。研究结果表明,防止机构服务器之间通信的最有效方法之一是公钥基础设施/SSL-TLS 加密。大多数研究都认为这是最有效的方法,因为它提供了一个中央认证机构,管理服务器的证书,允许基础设施中的每个模块或附件识别和验证其他成员,并继续加密网络流量。
{"title":"Risk analysis and prevention in computer security in institutional servers, a systematic review of the literature","authors":"Angel Namo-Ochoa, Eduardo Portilla-Cosar, Fernando Sierra-Liñan, M. Cabanillas-Carbonell","doi":"10.11591/eei.v13i3.6093","DOIUrl":"https://doi.org/10.11591/eei.v13i3.6093","url":null,"abstract":"In recent years, computer attacks on the server infrastructure in organizations have been increasing, and the pandemic of covid-19 and remote work have been the main causes for this massive wave of large-scale attacks, small businesses are especially vulnerable because to optimizing resources they leave aside the cyber security in their network infrastructure. The present research is a systematic review that compiles 58 articles where policies, techniques, and infrastructure for the prevention of threats in enterprise servers have been implemented and raised, these articles have been collected from major databases such as IEEE Xplore, SAGE, Science Direct, Scopus, and IOP Publishing. The results show that one of the most effective methods in preventing communications between institutional servers is public key infrastructure/SSL-TLS encryption. Most research claims that it is the most effective method as it provides a central certifier and manages the certificates for the servers allowing each of the modules or attachments within the infrastructure to identify and validate other members and to proceed with the encryption of network traffic, Finally, a security implementation model is proposed.","PeriodicalId":502860,"journal":{"name":"Bulletin of Electrical Engineering and Informatics","volume":"31 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141235553","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Kernel rootkit detection multi class on deep learning techniques 基于深度学习技术的多类内核 rootkit 检测
Pub Date : 2024-06-01 DOI: 10.11591/eei.v13i3.6802
Suresh Kumar Srinivasan, Sudalaimuthu Thalavaipillai
The harmful code application known as a rootkit is designed to be loaded and run directly from the operating system's (OSs') Kernel. Rootkits deployed in the Kernel, called Kernel-mode rootkits, can alter the OS. The intention behind these Kernel changes is to conceal the hack. Detecting a Kernel rootkit in a target machine is found to be quite challenging. Numerous techniques can be employed to modify the Kernel of a system. Kernel rootkits also create hidden access for attacks, enabling unauthorized entry to be gained by attackers on the machine. The ultimate consequence is that essential computer data can be modified, personal information can be gathered, and hackers can observe behavior. Synthetic neural networks support artificial intelligence, a branch of deep learning that models the human brain and operates on large datasets. This study proposed the Kernel rootkit detection multi-class deep learning techniques (KRDMCDLT). Deep learning algorithms are utilized to recognize the Kernel rootkit from a batch of data by selecting essential properties for learning tracking models. Thus, by identifying the OS malware, trojan assaults can be stopped before they can access infected data. This Kernel rootkit detection was tested in a Google Cloud Platform (GCP) computing system.
被称为 rootkit 的有害代码应用程序旨在直接从操作系统(OS)内核加载和运行。部署在内核中的 rootkit(称为内核模式 rootkit)可以改变操作系统。改变内核的目的是隐藏黑客行为。在目标机器中检测内核 rootkit 相当具有挑战性。可以使用许多技术来修改系统内核。内核 rootkit 还会为攻击创建隐藏访问权限,使攻击者在未经授权的情况下进入机器。最终的后果是,计算机的重要数据可能会被修改,个人信息可能会被收集,黑客还可以观察用户的行为。合成神经网络支持人工智能,是深度学习的一个分支,可模拟人脑并在大型数据集上运行。本研究提出了内核 rootkit 检测多类深度学习技术(KRDMCDLT)。利用深度学习算法,通过选择基本属性来学习跟踪模型,从而从一批数据中识别出内核 rootkit。因此,通过识别操作系统恶意软件,可以在木马访问受感染数据之前阻止其攻击。该内核 rootkit 检测在谷歌云平台(GCP)计算系统中进行了测试。
{"title":"Kernel rootkit detection multi class on deep learning techniques","authors":"Suresh Kumar Srinivasan, Sudalaimuthu Thalavaipillai","doi":"10.11591/eei.v13i3.6802","DOIUrl":"https://doi.org/10.11591/eei.v13i3.6802","url":null,"abstract":"The harmful code application known as a rootkit is designed to be loaded and run directly from the operating system's (OSs') Kernel. Rootkits deployed in the Kernel, called Kernel-mode rootkits, can alter the OS. The intention behind these Kernel changes is to conceal the hack. Detecting a Kernel rootkit in a target machine is found to be quite challenging. Numerous techniques can be employed to modify the Kernel of a system. Kernel rootkits also create hidden access for attacks, enabling unauthorized entry to be gained by attackers on the machine. The ultimate consequence is that essential computer data can be modified, personal information can be gathered, and hackers can observe behavior. Synthetic neural networks support artificial intelligence, a branch of deep learning that models the human brain and operates on large datasets. This study proposed the Kernel rootkit detection multi-class deep learning techniques (KRDMCDLT). Deep learning algorithms are utilized to recognize the Kernel rootkit from a batch of data by selecting essential properties for learning tracking models. Thus, by identifying the OS malware, trojan assaults can be stopped before they can access infected data. This Kernel rootkit detection was tested in a Google Cloud Platform (GCP) computing system.","PeriodicalId":502860,"journal":{"name":"Bulletin of Electrical Engineering and Informatics","volume":"7 38","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141229336","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The effectiveness of a hybrid MPPT controller based on an artificial neural network and fuzzy logic in low-light conditions 基于人工神经网络和模糊逻辑的混合 MPPT 控制器在弱光条件下的有效性
Pub Date : 2024-06-01 DOI: 10.11591/eei.v13i3.6416
Louki Hichem, Merabet Leila, Omeiri Amar
Technological advancement and economic progress have made power consumption a big issue. Concern is growing as traditional energy sources dwindle. In the future, numerous fossil fuels will be insufficient to satisfy human requirements. This motivates research into the feasibility of using renewable energy sources. Renewable energy sources offer a multitude of advantages, including their cost-effectiveness, lack of environmental impact, and sustainable nature. Sunlight is currently the most prevalent source of energy because it is both free and readily accessible. Consequently, photovoltaic (PV) energy is gaining importance in the field of electricity generation. Tracking the maximum power point (MPP) in a solar PV system is challenging due to varying meteorological conditions (irradiance and temperature). To maximise the efficiency of a solar power installation, it is essential to monitor the PV array's optimum power point. This analysis compares the perturb and observe (PO), fuzzy logic (FL), and suggested artificial neural network (ANN)-fuzzy strategy for determining the MPP of a PV system with minimal radiation exposure. Simulation results show that at low irradiation levels, the proposed ANN-fuzzy maximum power point tracking (MPPT) unit controller is superior to the FL and PO MPPT controllers in terms of tracking maximum power.
技术进步和经济发展使电力消耗成为一个大问题。随着传统能源的减少,人们对能源消耗的关注与日俱增。未来,大量化石燃料将无法满足人类的需求。这就促使人们研究使用可再生能源的可行性。可再生能源具有成本效益高、不影响环境和可持续发展等诸多优势。阳光是目前最普遍的能源,因为它既免费又容易获取。因此,光伏(PV)能源在发电领域的重要性与日俱增。由于气象条件(辐照度和温度)的变化,在太阳能光伏系统中跟踪最大功率点(MPP)是一项挑战。为了最大限度地提高太阳能发电装置的效率,必须监控光伏阵列的最佳功率点。本分析比较了扰动和观察 (PO)、模糊逻辑 (FL) 以及建议的人工神经网络 (ANN) - 模糊策略,以确定辐射量最小的光伏系统的 MPP。仿真结果表明,在低辐照水平下,建议的人工神经网络-模糊最大功率点跟踪 (MPPT) 单元控制器在跟踪最大功率方面优于 FL 和 PO MPPT 控制器。
{"title":"The effectiveness of a hybrid MPPT controller based on an artificial neural network and fuzzy logic in low-light conditions","authors":"Louki Hichem, Merabet Leila, Omeiri Amar","doi":"10.11591/eei.v13i3.6416","DOIUrl":"https://doi.org/10.11591/eei.v13i3.6416","url":null,"abstract":"Technological advancement and economic progress have made power consumption a big issue. Concern is growing as traditional energy sources dwindle. In the future, numerous fossil fuels will be insufficient to satisfy human requirements. This motivates research into the feasibility of using renewable energy sources. Renewable energy sources offer a multitude of advantages, including their cost-effectiveness, lack of environmental impact, and sustainable nature. Sunlight is currently the most prevalent source of energy because it is both free and readily accessible. Consequently, photovoltaic (PV) energy is gaining importance in the field of electricity generation. Tracking the maximum power point (MPP) in a solar PV system is challenging due to varying meteorological conditions (irradiance and temperature). To maximise the efficiency of a solar power installation, it is essential to monitor the PV array's optimum power point. This analysis compares the perturb and observe (PO), fuzzy logic (FL), and suggested artificial neural network (ANN)-fuzzy strategy for determining the MPP of a PV system with minimal radiation exposure. Simulation results show that at low irradiation levels, the proposed ANN-fuzzy maximum power point tracking (MPPT) unit controller is superior to the FL and PO MPPT controllers in terms of tracking maximum power.","PeriodicalId":502860,"journal":{"name":"Bulletin of Electrical Engineering and Informatics","volume":"21 17","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141233229","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Classifying possible hate speech from text with deep learning and ensemble on embedding method 用深度学习和嵌入法集合对文本中可能存在的仇恨言论进行分类
Pub Date : 2024-06-01 DOI: 10.11591/eei.v13i3.6041
Ebenhaiser Jonathan Caprisiano, Muhammad Hafizh Ramadhansyah, Amalia Zahra
Hate speech can be defined as the use of language to express hatred towards another party. Twitter is one of the most widely used social media platforms in the community. In addition to submitting user-generated content, other users can provide feedback through comments. There are several users who intentionally or unintentionally provide negative comments. Even though there are regulations regarding the prohibition of hate speech, there are still those who make negative comments. Using the deep learning method with the long short-term memory (LSTM) model, a classifier of possible hate speech from messages on Twitter is carried out. With the ensemble method, term frequency times inverse document frequency (TF-IDF) and global vector (GloVe) get 86% accuracy, better than the stand-alone word to vector (Word2Vec) method, which only gets 80%. From these results, it can be concluded that the ensemble method can improve accuracy compared to only using the stand-alone method. Ensemble methods can also improve the performance of deep learning systems and produce better results than using only one method.
仇恨言论可定义为使用语言表达对另一方的仇恨。Twitter 是社区中使用最广泛的社交媒体平台之一。除了提交用户生成的内容外,其他用户还可以通过评论提供反馈。有一些用户有意或无意地提供负面评论。尽管有禁止仇恨言论的规定,但仍有一些人发表负面评论。利用深度学习方法和长短期记忆(LSTM)模型,对 Twitter 上可能存在的仇恨言论进行了分类。通过集合方法,词频乘以反向文档频率(TF-IDF)和全局向量(GloVe)获得了 86% 的准确率,优于独立的词到向量(Word2Vec)方法,后者的准确率仅为 80%。从这些结果可以得出结论,与只使用独立方法相比,集合方法可以提高准确率。集合方法也能提高深度学习系统的性能,并产生比只使用一种方法更好的结果。
{"title":"Classifying possible hate speech from text with deep learning and ensemble on embedding method","authors":"Ebenhaiser Jonathan Caprisiano, Muhammad Hafizh Ramadhansyah, Amalia Zahra","doi":"10.11591/eei.v13i3.6041","DOIUrl":"https://doi.org/10.11591/eei.v13i3.6041","url":null,"abstract":"Hate speech can be defined as the use of language to express hatred towards another party. Twitter is one of the most widely used social media platforms in the community. In addition to submitting user-generated content, other users can provide feedback through comments. There are several users who intentionally or unintentionally provide negative comments. Even though there are regulations regarding the prohibition of hate speech, there are still those who make negative comments. Using the deep learning method with the long short-term memory (LSTM) model, a classifier of possible hate speech from messages on Twitter is carried out. With the ensemble method, term frequency times inverse document frequency (TF-IDF) and global vector (GloVe) get 86% accuracy, better than the stand-alone word to vector (Word2Vec) method, which only gets 80%. From these results, it can be concluded that the ensemble method can improve accuracy compared to only using the stand-alone method. Ensemble methods can also improve the performance of deep learning systems and produce better results than using only one method.","PeriodicalId":502860,"journal":{"name":"Bulletin of Electrical Engineering and Informatics","volume":"61 14","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141231502","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Accident black spots identification based on association rule mining 基于关联规则挖掘的事故黑点识别
Pub Date : 2024-06-01 DOI: 10.11591/eei.v13i3.6135
Abdelilah Mbarek, Mouna Jiber, Ali Yahyaouy, Abdelouahed Sabri
This paper presents an analytical approach to identifying the important characteristics of accident black spots on Moroccan rural roads. An association rule mining method is applied to extract road spatial characteristics associated with fatal accidents. The weighted severity index was calculated for each section, which was then used to determine the severity levels of black spots. The apriori algorithm is applied to find the correlation between road characteristics and the severity levels of black spots. Then, a general rule selection method is proposed to identify the rules strongly associated with each severity level. The results show that the proposed approach is effective in identifying the most important factors contributing to accidents. Furthermore, it shows that the combination of several road characteristics, such as road width, road surface, and bridge presence, may contribute to fatal accidents. The general rule selection found that wet, bad surfaces, and narrow shoulders were significantly associated with accidents on rural roads. The findings of the present study can help develop effective strategies to reduce road accidents and thus improve road safety in the country.
本文提出了一种分析方法,用于识别摩洛哥农村公路事故黑点的重要特征。采用关联规则挖掘法提取与致命事故相关的道路空间特征。计算出每个路段的加权严重性指数,然后用于确定黑点的严重程度。应用 apriori 算法找出道路特征与黑点严重程度之间的相关性。然后,提出了一种通用规则选择方法,以确定与每个严重程度级别密切相关的规则。结果表明,所提出的方法能有效识别导致事故的最重要因素。此外,它还表明,道路宽度、路面和桥梁存在等若干道路特征的组合可能会导致致命事故。一般规则选择发现,潮湿、糟糕的路面和狭窄的路肩与农村道路上的事故有显著关联。本研究的结果有助于制定有效的战略来减少道路事故,从而改善该国的道路安全。
{"title":"Accident black spots identification based on association rule mining","authors":"Abdelilah Mbarek, Mouna Jiber, Ali Yahyaouy, Abdelouahed Sabri","doi":"10.11591/eei.v13i3.6135","DOIUrl":"https://doi.org/10.11591/eei.v13i3.6135","url":null,"abstract":"This paper presents an analytical approach to identifying the important characteristics of accident black spots on Moroccan rural roads. An association rule mining method is applied to extract road spatial characteristics associated with fatal accidents. The weighted severity index was calculated for each section, which was then used to determine the severity levels of black spots. The apriori algorithm is applied to find the correlation between road characteristics and the severity levels of black spots. Then, a general rule selection method is proposed to identify the rules strongly associated with each severity level. The results show that the proposed approach is effective in identifying the most important factors contributing to accidents. Furthermore, it shows that the combination of several road characteristics, such as road width, road surface, and bridge presence, may contribute to fatal accidents. The general rule selection found that wet, bad surfaces, and narrow shoulders were significantly associated with accidents on rural roads. The findings of the present study can help develop effective strategies to reduce road accidents and thus improve road safety in the country.","PeriodicalId":502860,"journal":{"name":"Bulletin of Electrical Engineering and Informatics","volume":"57 51","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141232246","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Stereo matching algorithm using deep learning and edge-preserving filter for machine vision 使用深度学习和边缘保留滤波器的机器视觉立体匹配算法
Pub Date : 2024-06-01 DOI: 10.11591/eei.v13i3.5708
Shamsul Fakhar Abd Gani, M. F. Miskon, R. A. Hamzah, M. Hamid, A. F. Kadmin, A. I. Herman
Machine vision research began with a single-camera system, but these systems had various limitations from having just one point-of-view of the environment and no depth information, therefore stereo cameras were invented. This paper proposes a hybrid method of a stereo matching algorithm with the goal of generating an accurate disparity map critical for applications such as 3D surface reconstruction and robot navigation to name a few. Convolutional neural network (CNN) is utilised to generate the matching cost, which is then input into cost aggregation to increase accuracy with the help of a bilateral filter (BF). Winner-take-all (WTA) is used to generate the preliminary disparity map. An edge-preserving filter (EPF) is applied to that output based on a transform that defines an isometry between curves on the 2D image manifold in 5D and the real line to eliminate these artefacts. The transform warps the input signal adaptively to allow linear 1D filtering. Due to the filter's resistance to high contrast and brightness, it is effective in refining and removing noise from the output image. Based on experimental research employing a Middlebury standard validation benchmark, this approach gives high accuracy with an average non-occluded error of 6.71% comparable to other published methods.
机器视觉研究始于单摄像头系统,但这些系统仅有一个环境视角,没有深度信息,因而存在各种局限性,因此立体摄像头应运而生。本文提出了一种立体匹配算法的混合方法,目的是生成对三维表面重建和机器人导航等应用至关重要的精确差异图。利用卷积神经网络(CNN)生成匹配成本,然后输入成本聚合,借助双边滤波器(BF)提高精确度。胜者为王(WTA)用于生成初步的差异图。边缘保留滤波器(EPF)应用于基于变换的输出,该变换定义了 5D 中 2D 图像流形上的曲线与实线之间的等距,以消除这些伪影。该变换对输入信号进行自适应扭曲,以实现线性一维滤波。由于滤波器对高对比度和高亮度的耐受性,它能有效地细化和消除输出图像中的噪声。根据采用米德尔伯里标准验证基准进行的实验研究,这种方法具有较高的准确性,平均非排除误差为 6.71%,可与其他已公布的方法相媲美。
{"title":"Stereo matching algorithm using deep learning and edge-preserving filter for machine vision","authors":"Shamsul Fakhar Abd Gani, M. F. Miskon, R. A. Hamzah, M. Hamid, A. F. Kadmin, A. I. Herman","doi":"10.11591/eei.v13i3.5708","DOIUrl":"https://doi.org/10.11591/eei.v13i3.5708","url":null,"abstract":"Machine vision research began with a single-camera system, but these systems had various limitations from having just one point-of-view of the environment and no depth information, therefore stereo cameras were invented. This paper proposes a hybrid method of a stereo matching algorithm with the goal of generating an accurate disparity map critical for applications such as 3D surface reconstruction and robot navigation to name a few. Convolutional neural network (CNN) is utilised to generate the matching cost, which is then input into cost aggregation to increase accuracy with the help of a bilateral filter (BF). Winner-take-all (WTA) is used to generate the preliminary disparity map. An edge-preserving filter (EPF) is applied to that output based on a transform that defines an isometry between curves on the 2D image manifold in 5D and the real line to eliminate these artefacts. The transform warps the input signal adaptively to allow linear 1D filtering. Due to the filter's resistance to high contrast and brightness, it is effective in refining and removing noise from the output image. Based on experimental research employing a Middlebury standard validation benchmark, this approach gives high accuracy with an average non-occluded error of 6.71% comparable to other published methods.","PeriodicalId":502860,"journal":{"name":"Bulletin of Electrical Engineering and Informatics","volume":"110 2","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141234333","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Low insertion loss open-loop resonator–based microstrip diplexer with high selective for wireless applications 基于低插入损耗开环谐振器的高选择性微带双工器,适用于无线应用
Pub Date : 2024-06-01 DOI: 10.11591/eei.v13i3.6789
Rania Hamdy Elabd, Ahmed Jamal Abdullah Al-Gburi, Khaled Alhassoon, Mohd Muzafar Ismail, Zahriladha Zakaria
This paper presents a low-insertion-loss open-loop resonator (OLR)-based microstrip diplexer with high-selective for wireless applications. We used two series capacitive gaps in the microstrip transmission line, loaded with rectangular-shaped half-wavelength OLRs, to create a high-selectivity bandpass filter (BPF). The planned BPFs are linked through a T-junction combiner, precisely tuned to align with both filters and the antenna port in order to produce the proposed diplexer. The system is implemented on a rogers TMM4 substrate with a loss tangent of 0.002, a dielectric constant of 4.7, and a thickness of 1.52 mm. The suggested diplexer has dimensions of (90×70) mm². It achieves a modest frequency space ratio of R=0.1646 in both transmit and receive modes by having two resonance frequencies of ft=2.191 GHz and fr=2.584 GHz, respectively. The simulated structure displays good insertion losses of approximately 1.2 dB and 1.79 dB for the two channels, respectively, at fractional bandwidths of 1.24% at 2.191 GHz and 0.636% at 2.584 GHz. The simulated isolation values for 2.191 GHz and 2.584 GHz are 53.3 dB and 66.5 dB, respectively.
本文介绍了一种基于低插入损耗开环谐振器(OLR)的微带双工器,具有适用于无线应用的高选择性。我们在微带传输线中使用两个串联电容间隙,加载矩形半波长开环谐振器,以创建一个高选择性带通滤波器(BPF)。计划中的 BPF 通过一个 T 型结合路器连接,该合路器经过精确调谐,与两个滤波器和天线端口对齐,从而产生所建议的双工器。该系统是在罗杰斯 TMM4 衬底上实现的,其损耗正切为 0.002,介电常数为 4.7,厚度为 1.52 毫米。建议的双工器尺寸为 (90×70) mm²。它的两个共振频率分别为 ft=2.191 GHz 和 fr=2.584 GHz,在发射和接收模式下都达到了 R=0.1646 的适度频空比。模拟结构显示,在 2.191 GHz 和 2.584 GHz 的分数带宽分别为 1.24% 和 0.636% 时,两个信道的插入损耗分别约为 1.2 dB 和 1.79 dB。2.191 GHz 和 2.584 GHz 的模拟隔离值分别为 53.3 dB 和 66.5 dB。
{"title":"Low insertion loss open-loop resonator–based microstrip diplexer with high selective for wireless applications","authors":"Rania Hamdy Elabd, Ahmed Jamal Abdullah Al-Gburi, Khaled Alhassoon, Mohd Muzafar Ismail, Zahriladha Zakaria","doi":"10.11591/eei.v13i3.6789","DOIUrl":"https://doi.org/10.11591/eei.v13i3.6789","url":null,"abstract":"This paper presents a low-insertion-loss open-loop resonator (OLR)-based microstrip diplexer with high-selective for wireless applications. We used two series capacitive gaps in the microstrip transmission line, loaded with rectangular-shaped half-wavelength OLRs, to create a high-selectivity bandpass filter (BPF). The planned BPFs are linked through a T-junction combiner, precisely tuned to align with both filters and the antenna port in order to produce the proposed diplexer. The system is implemented on a rogers TMM4 substrate with a loss tangent of 0.002, a dielectric constant of 4.7, and a thickness of 1.52 mm. The suggested diplexer has dimensions of (90×70) mm². It achieves a modest frequency space ratio of R=0.1646 in both transmit and receive modes by having two resonance frequencies of ft=2.191 GHz and fr=2.584 GHz, respectively. The simulated structure displays good insertion losses of approximately 1.2 dB and 1.79 dB for the two channels, respectively, at fractional bandwidths of 1.24% at 2.191 GHz and 0.636% at 2.584 GHz. The simulated isolation values for 2.191 GHz and 2.584 GHz are 53.3 dB and 66.5 dB, respectively.","PeriodicalId":502860,"journal":{"name":"Bulletin of Electrical Engineering and Informatics","volume":"3 5","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141229198","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
New control scheme for a dynamic voltage restorer based on selective harmonic injection technique with repetitive controller 基于选择性谐波注入技术和重复控制器的动态电压恢复器新控制方案
Pub Date : 2024-06-01 DOI: 10.11591/eei.v13i3.5312
P. Tapre, Mohan P. Thakre, Ramesh Pawase, Jaywant S. Thorat, Dipak J. Dahigaonkar, Rahul G. Mapari, S. Kadlag, S. Khule
Repetitive controller and selective harmonic injection technique (SHI) in medium and low voltage distribution networks improve dynamic voltage restorer (DVR) DC bus voltages as well as nullify power quality (PQ) problems. DVRs use sinusoidal pulse width modulation (SPWM) firing control, but DC bus use seems to be limited, affecting density, cost, and power packaging. By adding 1/6th of the 3rd harmonic waveform to the basic waveform, SPWM yields the developed model. According to the findings, 15% of DC bus usage improves and produces high voltage AC. Nevertheless, just control systems perturb PQ. The proposed controller uses feed forward and feedback to enhance transient response and justify stable zero error. 3rd third harmonic injection pulse width modulation (THIPWM) improves total harmonic distortion (THD) in the proposed scheme. Power system computer aided design (PSCAD) simulation produced high accuracy for THIPWM and repetitive controllers.
中低压配电网络中的重复控制器和选择性谐波注入技术(SHI)可改善动态电压恢复器(DVR)的直流母线电压,并消除电能质量(PQ)问题。DVR 使用正弦脉宽调制 (SPWM) 点火控制,但直流母线的使用似乎受到限制,影响了密度、成本和功率封装。通过在基本波形中加入 1/6 的 3 次谐波波形,SPWM 产生了所开发的模型。根据研究结果,15% 的直流母线使用率得到改善,并产生高压交流电。然而,仅仅控制系统会扰动 PQ。建议的控制器使用前馈和反馈来增强瞬态响应,并证明零误差是稳定的。三次谐波注入脉宽调制(THIPWM)改善了拟议方案中的总谐波失真(THD)。电力系统计算机辅助设计 (PSCAD) 仿真为 THIPWM 和重复控制器提供了高精度。
{"title":"New control scheme for a dynamic voltage restorer based on selective harmonic injection technique with repetitive controller","authors":"P. Tapre, Mohan P. Thakre, Ramesh Pawase, Jaywant S. Thorat, Dipak J. Dahigaonkar, Rahul G. Mapari, S. Kadlag, S. Khule","doi":"10.11591/eei.v13i3.5312","DOIUrl":"https://doi.org/10.11591/eei.v13i3.5312","url":null,"abstract":"Repetitive controller and selective harmonic injection technique (SHI) in medium and low voltage distribution networks improve dynamic voltage restorer (DVR) DC bus voltages as well as nullify power quality (PQ) problems. DVRs use sinusoidal pulse width modulation (SPWM) firing control, but DC bus use seems to be limited, affecting density, cost, and power packaging. By adding 1/6th of the 3rd harmonic waveform to the basic waveform, SPWM yields the developed model. According to the findings, 15% of DC bus usage improves and produces high voltage AC. Nevertheless, just control systems perturb PQ. The proposed controller uses feed forward and feedback to enhance transient response and justify stable zero error. 3rd third harmonic injection pulse width modulation (THIPWM) improves total harmonic distortion (THD) in the proposed scheme. Power system computer aided design (PSCAD) simulation produced high accuracy for THIPWM and repetitive controllers.","PeriodicalId":502860,"journal":{"name":"Bulletin of Electrical Engineering and Informatics","volume":"20 10","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141229826","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Nonlinear control of three level NPC inverter used in PV/grid system: comparison of topologies and control methods 光伏/电网系统中使用的三电平 NPC 逆变器的非线性控制:拓扑结构和控制方法比较
Pub Date : 2024-06-01 DOI: 10.11591/eei.v13i3.7122
Youness Atifi, A. Raihani, M. Kissaoui, R. Lajouad, Khalid Errakkas
With the passage of time, the importance of using renewable energy systems to overcome energy consumption and improve the quality of the grid has emerged through the use of nonlinear control techniques and reliance on advanced types of inverters such as multi-level inverters. This research is focused on comparing two grid-connected converter topologies in a photovoltaic (PV) generation system connected to a three-phase grid that serves a non-linear load. Additionally, the study explores two different control techniques applied to this converter, evaluating their effects on the total harmonic distortion coefficient. A comparison has been made between the traditional inverter and the three-level inverter type neutral point clamped (NPC) inverter, with the use of integral backstepping (IBS) technique which was also compared with the proportional integral (PI) controller. The simulation results in MATLAB/Simulink are presented illustrating the performances and the strong effectiveness of the three-level NPC inverter controlled by the proposed technique (IBS).
随着时间的推移,通过使用非线性控制技术和依赖多电平逆变器等先进类型的逆变器,利用可再生能源系统克服能源消耗和提高电网质量的重要性日益凸显。本研究的重点是比较连接到三相电网并为非线性负载服务的光伏发电系统中的两种并网变流器拓扑结构。此外,研究还探讨了应用于该转换器的两种不同控制技术,评估了它们对总谐波畸变系数的影响。比较了传统逆变器和三电平逆变器类型的中性点箝位(NPC)逆变器,使用了积分反向步进(IBS)技术,并与比例积分(PI)控制器进行了比较。MATLAB/Simulink 中的仿真结果表明,采用所提议的技术(IBS)控制的三电平 NPC 逆变器性能卓越,效果显著。
{"title":"Nonlinear control of three level NPC inverter used in PV/grid system: comparison of topologies and control methods","authors":"Youness Atifi, A. Raihani, M. Kissaoui, R. Lajouad, Khalid Errakkas","doi":"10.11591/eei.v13i3.7122","DOIUrl":"https://doi.org/10.11591/eei.v13i3.7122","url":null,"abstract":"With the passage of time, the importance of using renewable energy systems to overcome energy consumption and improve the quality of the grid has emerged through the use of nonlinear control techniques and reliance on advanced types of inverters such as multi-level inverters. This research is focused on comparing two grid-connected converter topologies in a photovoltaic (PV) generation system connected to a three-phase grid that serves a non-linear load. Additionally, the study explores two different control techniques applied to this converter, evaluating their effects on the total harmonic distortion coefficient. A comparison has been made between the traditional inverter and the three-level inverter type neutral point clamped (NPC) inverter, with the use of integral backstepping (IBS) technique which was also compared with the proportional integral (PI) controller. The simulation results in MATLAB/Simulink are presented illustrating the performances and the strong effectiveness of the three-level NPC inverter controlled by the proposed technique (IBS).","PeriodicalId":502860,"journal":{"name":"Bulletin of Electrical Engineering and Informatics","volume":"10 4","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141230172","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Bulletin of Electrical Engineering and Informatics
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1