2022 6th European Conference on Electrical Engineering & Computer Science (ELECS)最新文献

筛选
英文 中文
The Road Map of Digitization and the Art of Convergence 数字化路线图与融合艺术
2022 6th European Conference on Electrical Engineering & Computer Science (ELECS) Pub Date : 2022-12-01 DOI: 10.1109/ELECS55825.2022.00024
I. Mihajlović, Cvijeta Djevojić
{"title":"The Road Map of Digitization and the Art of Convergence","authors":"I. Mihajlović, Cvijeta Djevojić","doi":"10.1109/ELECS55825.2022.00024","DOIUrl":"https://doi.org/10.1109/ELECS55825.2022.00024","url":null,"abstract":"This paper seeks to understand the role of digital transformation (DT) as well as the ways in which it helps companies to remain competitive in terms of dynamic market challenges. Progressive trends in the digitization of economies, disruptive processes characterize the contemporary conditions of market competition. Such dynamics affect institutions, society and the environment, not only companies. . Due to the large number of topics related to digital transformation that have been researched in the literature in the last twenty years, it is not surprising that there is an exceptional interest in the continuous research of this issue and its impact on numerous areas. In this paper, the phrase \"digital transformation\" is defined in terms of the model, business process and conditions that make its implementation essential and appropriate. The purpose of the paper is to illuminate the current state of literature on digital transformation. This paper talks about the importance of state-of-the-art technologies that support companies in overcoming uncertainty. Providing a perfect platform built on an architecture that is unique, should equally serve the interests of all market poles and be based on technology that contributes to society and creates value. In the first part of the paper, we will give an overview of the existing literature on digital transformation, and then terminologically define the concept of digital transformation. After the first part, the second part of the paper refers to the overview of the state of digital transformation, defining the limitations of the work and considering the implications of future research.","PeriodicalId":320259,"journal":{"name":"2022 6th European Conference on Electrical Engineering & Computer Science (ELECS)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125536876","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Supply Chain Infrastructure Co-investments: Locating A Balanced Growth Path 供应链基础设施共同投资:寻找平衡的增长路径
2022 6th European Conference on Electrical Engineering & Computer Science (ELECS) Pub Date : 2022-12-01 DOI: 10.1109/ELECS55825.2022.00011
K. Kogan
{"title":"Supply Chain Infrastructure Co-investments: Locating A Balanced Growth Path","authors":"K. Kogan","doi":"10.1109/ELECS55825.2022.00011","DOIUrl":"https://doi.org/10.1109/ELECS55825.2022.00011","url":null,"abstract":"Infrastructure investments are critical to support economic growth and sustain development. We consider a supply chain comprised of several firms operating under a common infrastructure and cooperating in infrastructure fund management and investment. We assume that the firms’ capital represents the supply chain infrastructure and that the firms’ goals are to choose employment and co-investment levels that maximize their long-run discounted profits. The problem is formulated as a differential game between the supply chain parties and the focus is on commitment Nash equilibria. Specifically, we derive the conditions under which a long-run path of balanced growth of infrastructure capital exists and determine the rate of growth. Furthermore, based on those results, we propose an efficient numerical algorithm for locating transient equilibrium co-investment trajectories that tend toward balanced growth of infrastructure capital and employment.","PeriodicalId":320259,"journal":{"name":"2022 6th European Conference on Electrical Engineering & Computer Science (ELECS)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126604758","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Preliminary study on the shape of speech data manifold in linear signal subspace 线性信号子空间中语音数据流形形状的初步研究
2022 6th European Conference on Electrical Engineering & Computer Science (ELECS) Pub Date : 2022-12-01 DOI: 10.1109/ELECS55825.2022.00023
X. Zhuang, N. Mastorakis
{"title":"Preliminary study on the shape of speech data manifold in linear signal subspace","authors":"X. Zhuang, N. Mastorakis","doi":"10.1109/ELECS55825.2022.00023","DOIUrl":"https://doi.org/10.1109/ELECS55825.2022.00023","url":null,"abstract":"The data vectors of speech pronunciation signals are projected into the signal subspace. This low-dimensional signal subspace is estimated by the Principal Component Analysis. The geometric shape of the signal manifold in the signal subspace is studied. The correspondence between the change of manifold shape and the change of pronunciation is revealed by experiments, which has potential application in speech signal segmentation.","PeriodicalId":320259,"journal":{"name":"2022 6th European Conference on Electrical Engineering & Computer Science (ELECS)","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130565527","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cellular Offloading of eMBB and URLLC Services in Multiple UAV-aided Communication Networks 多无人机辅助通信网络中eMBB和URLLC业务的蜂窝卸载
2022 6th European Conference on Electrical Engineering & Computer Science (ELECS) Pub Date : 2022-12-01 DOI: 10.1109/ELECS55825.2022.00027
Y. Prathyusha, T. Sheu
{"title":"Cellular Offloading of eMBB and URLLC Services in Multiple UAV-aided Communication Networks","authors":"Y. Prathyusha, T. Sheu","doi":"10.1109/ELECS55825.2022.00027","DOIUrl":"https://doi.org/10.1109/ELECS55825.2022.00027","url":null,"abstract":"With the emergence of wireless cellular technologies and the dense deployment of cellular infrastructure, incorporating unmanned aerial vehicles (UAVs) into the fifth-generation (5G) and beyond networks is a promising solution to support a wide range of diversified applications. The 5G wireless systems are intended to support two promising critical services: enhanced mobile broadband (eMBB) and ultra-reliable and low latency communications (URLLC). In this paper, we studied the resource allocation problem of eMBB and URLLC services with the aim of maximizing throughput under non-orthogonal multiple access (NOMA) with the aid of multiple UAVs. Initially, for the deployment of UAVs, we adopted K-means based clustering algorithm for user partitioning. Then, we proposed a simple low complex algorithm for resource allocation. The significance of the proposed methodology over baseline approaches is evaluated using numerical simulations in terms of system performance indicators.","PeriodicalId":320259,"journal":{"name":"2022 6th European Conference on Electrical Engineering & Computer Science (ELECS)","volume":"185 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114005375","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Safety and Observibility of Distributed Broadcast Algorithms 分布式广播算法的安全性和可观察性
2022 6th European Conference on Electrical Engineering & Computer Science (ELECS) Pub Date : 2022-12-01 DOI: 10.1109/ELECS55825.2022.00010
M. Karaata, Aysha Dabees
{"title":"Safety and Observibility of Distributed Broadcast Algorithms","authors":"M. Karaata, Aysha Dabees","doi":"10.1109/ELECS55825.2022.00010","DOIUrl":"https://doi.org/10.1109/ELECS55825.2022.00010","url":null,"abstract":"In this paper, we first show the condition under which the transient faults are observable and the safety requirements are satisfied for a broadcast algorithm. Then we propose the first safe fault-containing and self-healing broadcast algorithm for locally observable faults in tree networks. A locally observable transient fault refers to a transient fault that perturbs the state of a process such that a faulty state of a process could be distinguished from a non-faulty state by all neighbours of the faulty process, and locally non-observable transient faults, otherwise. Our proposed algorithm contains and self-heals an unlimited number of transient faults in at most O(3) rounds provided that any two faulty processes are separated by two non-faulty processes.","PeriodicalId":320259,"journal":{"name":"2022 6th European Conference on Electrical Engineering & Computer Science (ELECS)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114823791","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
WiFi and BLE Fingerprinting for Smartphone Proximity Detection WiFi和BLE指纹识别智能手机接近检测
2022 6th European Conference on Electrical Engineering & Computer Science (ELECS) Pub Date : 2022-12-01 DOI: 10.1109/ELECS55825.2022.00029
T. Javornik, Stefan Kalabakov, A. Švigelj
{"title":"WiFi and BLE Fingerprinting for Smartphone Proximity Detection","authors":"T. Javornik, Stefan Kalabakov, A. Švigelj","doi":"10.1109/ELECS55825.2022.00029","DOIUrl":"https://doi.org/10.1109/ELECS55825.2022.00029","url":null,"abstract":"Wireless devices such as smartphones, wireless bracelets or smartwatches are now often used by a single person. They can therefore be used to model human contact, proximity to each other, or social networking. In light of events such as the recent pandemic interactions or proximity between people have become increasingly important. In this context, this paper explores the limitations of a machine learning-based approach that detects the proximity of two devices (up to about two metres) based on WiFi and BLE (Bluetooth Low Energy) fingerprints of their radio environments. Specifically, we compare the use of a rudimentary set of two features and an extended, more complex set of features, exploring the use of separate classifiers that treat WiFi and BLE features separately. In addition, we investigate whether using only one of the two communication technologies for detection could lead to better results and the importance of radio propagation expertise in feature extraction. We found that using a more complex set of features that can be subjected to further feature selection procedures can provide a performance benefit of about 4.6 percentage points. In terms of the communication technologies used, our results also show that using BLE alone always leads to significantly worse results than using WiFi alone or WiFi and BLE together. The evaluation was carried out in three different radio environments, namely indoors in companies, outdoors on the street and in the staircase of residential building with many apartments.","PeriodicalId":320259,"journal":{"name":"2022 6th European Conference on Electrical Engineering & Computer Science (ELECS)","volume":"106 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115566592","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Low-Voltage Improved Accuracy CMOS VGA Circuit 低电压提高精度CMOS VGA电路
2022 6th European Conference on Electrical Engineering & Computer Science (ELECS) Pub Date : 2022-12-01 DOI: 10.1109/ELECS55825.2022.00021
C. Popa
{"title":"Low-Voltage Improved Accuracy CMOS VGA Circuit","authors":"C. Popa","doi":"10.1109/ELECS55825.2022.00021","DOIUrl":"https://doi.org/10.1109/ELECS55825.2022.00021","url":null,"abstract":"The paper presents a 100dB-linear VGA circuit, designed for a low-voltage operation, having a multitude of applications, such as synthesizers, amplitude modulation and audio level compression. The original design method proposes the approximation of the exponential function by implementing a new fourth-order approximation function that allows to obtain high accuracy of the circuit and a wide decibel linear range (100dB), considering a deviation from the exponential function equal with ± 1dB. The proposed variable gain amplifier presents the advantage of current-mode operation that increases the circuit frequency response. An additional increasing of the exponential function accuracy represents a consequence of the independence of the output signal on technological-caused errors and also on temperature. The circuit is designed for an implementation in 0.18μm CMOS technology on a chip area of approximately 12μm2, being characterized by a low-voltage low-power operation (a supply voltage of 0.9V and a maximal current consumption smaller than 1.9μA).","PeriodicalId":320259,"journal":{"name":"2022 6th European Conference on Electrical Engineering & Computer Science (ELECS)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125410360","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Attacks against Machine Learning Models in 5G Networks 针对5G网络中机器学习模型的攻击
2022 6th European Conference on Electrical Engineering & Computer Science (ELECS) Pub Date : 2022-12-01 DOI: 10.1109/ELECS55825.2022.00026
M. Zolotukhin, Di Zhang, Parsa Miraghaie, Timo Hämäläinen, Wang Ke, Marja Dunderfelt
{"title":"Attacks against Machine Learning Models in 5G Networks","authors":"M. Zolotukhin, Di Zhang, Parsa Miraghaie, Timo Hämäläinen, Wang Ke, Marja Dunderfelt","doi":"10.1109/ELECS55825.2022.00026","DOIUrl":"https://doi.org/10.1109/ELECS55825.2022.00026","url":null,"abstract":"Artificial intelligence and machine learning are revolutionising almost every industry with a seemingly endless list of applications. This list also includes mobile networking for which employing machine learning algorithms can improve efficiency, latency, and reliability of services and applications. For this reason, functionality of future 5G networks is expected to depend on accurate and timely performance of its artificial intelligence components, and disturbance in the functionality of these components may have negative impact on the entire network. This study focuses on analysing adversarial example generation attacks against machine learning based frameworks that may be present in the next generation mobile networks. In particular, we study transferability of adversarial example attacks to the 5G domain and evaluate their negative impact on the network performance in several realistic use case scenarios.","PeriodicalId":320259,"journal":{"name":"2022 6th European Conference on Electrical Engineering & Computer Science (ELECS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125436215","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Change detection by masking reversible areas 通过屏蔽可逆区域来改变检测
2022 6th European Conference on Electrical Engineering & Computer Science (ELECS) Pub Date : 2022-12-01 DOI: 10.1109/ELECS55825.2022.00025
Soltana Achour, Amina Guidoum, M. C. El Mezouar, N. Taleb
{"title":"Change detection by masking reversible areas","authors":"Soltana Achour, Amina Guidoum, M. C. El Mezouar, N. Taleb","doi":"10.1109/ELECS55825.2022.00025","DOIUrl":"https://doi.org/10.1109/ELECS55825.2022.00025","url":null,"abstract":"Many issues addressed today in remote sensing based on data from multi-temporal satellite images are related to change detection, for the implementation techniques having aims at the location, characterization and quantification changes in the state of an object in same scene area which have evolved between different instants. Unfortunately, most of these techniques confront the problem of persistent shadows and cloud cover, even after selecting the best images. Knowing, that clouds and shadow are considered as false alarms (no real change). However, in this paper, we propose to detect the changes by eliminating the false alarms (shadow and clouds) from the areas covered by the shadows of the objects and the cloud cover. In order, to improve and obtain almost real change results. For this we used the combination of two methods: the change detection method, clouds and shadows detection method, to eliminate their information detected as change. The obtained results show the efficiency of the proposed method.","PeriodicalId":320259,"journal":{"name":"2022 6th European Conference on Electrical Engineering & Computer Science (ELECS)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122282248","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信