S. Burhan, Sidra Minhas, Amara Tariq, Muhammad Nabeel Hassan
{"title":"Comparative Study Of Deep Learning Algorithms For Disease And Pest Detection In Rice Crops","authors":"S. Burhan, Sidra Minhas, Amara Tariq, Muhammad Nabeel Hassan","doi":"10.1109/ECAI50035.2020.9223239","DOIUrl":"https://doi.org/10.1109/ECAI50035.2020.9223239","url":null,"abstract":"Accurate and timely detection of rice crop diseases like Leaf Blast and Brown Spot, as well as pests like Hispa, can help minimize crop losses and increase the yield obtained. Since Pakistan is an agricultural country, such researches are imperative to its economic growth. This research is focused on a comparative study between the performances of five different Deep Learning Models i.e. Vgg16, Vgg19, ResNet50, ResNet50V2, and ResNet101V2 on both artificial data as well as on images collected from the rice fields in Gujranwala, Pakistan. The artificial data set has been classified into four classes Hispa, Healthy, Brown Spot, and Leaf Blast; whereas binary classification of Healthy Vs. Unhealthy has been performed on the data set collected from the fields. All images have been pre-processed by removing backgrounds and shadows before being passed through the models. On the artificial data set, the ResNet50 model performed the best with an accuracy of 75.0real data set, the ResNet101V2 was the best performing model with an accuracy of 86.799","PeriodicalId":324813,"journal":{"name":"2020 12th International Conference on Electronics, Computers and Artificial Intelligence (ECAI)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124484065","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Use of OPC Protocol, DeltaV Distributed System and Simulink for Level Control with PI and IMC Algorithms","authors":"M. Popescu","doi":"10.1109/ECAI50035.2020.9223217","DOIUrl":"https://doi.org/10.1109/ECAI50035.2020.9223217","url":null,"abstract":"The paper study the possibility of using the OPC protocol to transmit data in real time between DeltaV distributed system and Simulink environment in order to develop a level control system in a real plant. The DeltaV system is configured in order to acquire the level value from the transducer, and to transmit the commands for the control valve and the pump. The control algorithms, Proportional-Integral (PI) and Internal Model Control (IMC), are implemented in Simulink. In order to facilitate the real time connection between DeltaV and Simulink, OPC protocol functions are used. The developed level control system is studied for changes of set-point and disturbance. The results obtained for the two cases (PI and IMC algorithms) are compared in terms of transient time, time delay and overshoot. All the results are obtained for the real plant.","PeriodicalId":324813,"journal":{"name":"2020 12th International Conference on Electronics, Computers and Artificial Intelligence (ECAI)","volume":"912 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126988123","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Oproescu, N. Bizon, E. Carcadea, M. Culcer, M. Iliescu, M. Raceanu, S. Sorlei
{"title":"Performance of the load-following control switched to the air and hydrogen regulators of the fuel cell system","authors":"M. Oproescu, N. Bizon, E. Carcadea, M. Culcer, M. Iliescu, M. Raceanu, S. Sorlei","doi":"10.1109/ECAI50035.2020.9223155","DOIUrl":"https://doi.org/10.1109/ECAI50035.2020.9223155","url":null,"abstract":"In this paper we analyze the efficient and safe functioning of the load following control (LFC) switched to the inlets of the air and hydrogen regulators of the Fuel Cell system. The performance is highlighted compared to a commercial strategy using the static feed-forward (sFF) control, resulting under the variable load cycles a fuel economy about 13%.","PeriodicalId":324813,"journal":{"name":"2020 12th International Conference on Electronics, Computers and Artificial Intelligence (ECAI)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125584791","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Automatic generation of quizzes for C programming language","authors":"A. Ene, C. Stirbu","doi":"10.1109/ECAI50035.2020.9223159","DOIUrl":"https://doi.org/10.1109/ECAI50035.2020.9223159","url":null,"abstract":"In this paper we present a Java software application that illustrates the possibility to generate automatically quizzes for the C programming language. In many computer science faculties, C language is the first programming language to be studied, so, a good knowledge of this language will help a student learn better the other programming languages. The generated quiz will test a student’s knowledge about the way of defining functions in C language. A random generated question is presented to the student and he will write his answer. The correctitude of the answer of the student is analysed using regular expressions.","PeriodicalId":324813,"journal":{"name":"2020 12th International Conference on Electronics, Computers and Artificial Intelligence (ECAI)","volume":"150 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117332068","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Privacy-Preserving Machine Learning Using Federated Learning and Secure Aggregation","authors":"Dragos Lia, Mihai Togan","doi":"10.1109/ECAI50035.2020.9223127","DOIUrl":"https://doi.org/10.1109/ECAI50035.2020.9223127","url":null,"abstract":"Over the past few years, machine learning has been responsible for the rapid advancements in fields such as computer vision, natural language processing and speech recognition. No small part of this success is due to data becoming more and more available, often being collected in privacy-invasive ways. The aim of this work is to study the use of two privacy-preserving solutions for training machine learning models: Federated Learning (FL) and Secure Multiparty Computation (MPC). Federated learning is a subfield of machine learning that allows training models on a large, decentralized corpus of data residing on edge devices like smartphones. Instead of sharing data, users collaboratively train a model by only sending weight updates to a server. By leveraging secure multiparty computation, it can be ensured that the server cannot inspect any individual user's update. To assess the feasibility of these approaches in different settings, a client-server architecture was implemented in Python and multiple experiments were run on datasets made available by LEAF in order to investigate ways of improving the overall performance of the models trained in a federated manner.","PeriodicalId":324813,"journal":{"name":"2020 12th International Conference on Electronics, Computers and Artificial Intelligence (ECAI)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130001090","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
D. Puchianu, N. Angelescu, G. Predusca, L. Circiumarescu, E. Diaconu
{"title":"Comparative study of power consumption on Mikrotik and Fortigate routers","authors":"D. Puchianu, N. Angelescu, G. Predusca, L. Circiumarescu, E. Diaconu","doi":"10.1109/ECAI50035.2020.9223210","DOIUrl":"https://doi.org/10.1109/ECAI50035.2020.9223210","url":null,"abstract":"The recent push towards cloud-based services and IoT solutions have increased the demand for high performing routers that also offer low power consumption. This study is focused on the comparative analysis of two enterprise grade routers, namely the Mikrotik CCR1009-8G-1S-1S+ and the FortiGate 60C. Their efficiency in terms of data transfer rate versus power consumption is evaluated on different traffic types. Two scenarios are considered: the handling of IPSec UDP traffic and the handling of both TCP and UDP.","PeriodicalId":324813,"journal":{"name":"2020 12th International Conference on Electronics, Computers and Artificial Intelligence (ECAI)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131090088","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Financial and technical forecast analysis of a cogeneration biomas plant - Case study in Romania","authors":"A. Enescu, H. Andrei, E. Diaconu, N. Angelescu","doi":"10.1109/ECAI50035.2020.9223196","DOIUrl":"https://doi.org/10.1109/ECAI50035.2020.9223196","url":null,"abstract":"The production of electric and thermal energy using biomass is extremely important in the current context of the financial crisis and the continuous decrease of the reserves of conventional energy sources. This article analyzes the opportunity to locate the cogeneration plant that uses biomass from a rich region of Romania in this unconventional resource. Then the technical-economic indicators obtained by the plant during 6 years of operation are presented and analyzed. These indicators are used to develop a financial forecast extremely useful for the future development of the analyzed plant.","PeriodicalId":324813,"journal":{"name":"2020 12th International Conference on Electronics, Computers and Artificial Intelligence (ECAI)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121279700","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Internet Hate speech – case study of Poland, Romania, India and Bulgaria","authors":"M. Jablonska, Z. Pólkowski","doi":"10.1109/ECAI50035.2020.9223209","DOIUrl":"https://doi.org/10.1109/ECAI50035.2020.9223209","url":null,"abstract":"As online hate is ubiquitous and spread on the cyberspace, new studies are needed to understand its nature and evolution. We have researched young adults from Poland, India, Romania and Bulgaria to study their hate experiences. We have found out that online hate is an inherent part of their cyberspace activities. This implies a necessity of ongoing education at this field as current skills of participants on dealing with hate speech and possibilities of support as well as legal responsibilities remain relatively low.","PeriodicalId":324813,"journal":{"name":"2020 12th International Conference on Electronics, Computers and Artificial Intelligence (ECAI)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126866404","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Alexandru Costache, D. Popescu, S. Mocanu, L. Ichim
{"title":"Target Audience Response Analysis in Out-of-home Advertising Using Computer Vision","authors":"Alexandru Costache, D. Popescu, S. Mocanu, L. Ichim","doi":"10.1109/ECAI50035.2020.9223134","DOIUrl":"https://doi.org/10.1109/ECAI50035.2020.9223134","url":null,"abstract":"In this paper we aim to analyze the response of the target audience to out-of-home advertising panels mounted in display windows. We track people passing in front of the panels and, if they approach the panel, looking directly at it, we analyze their facial movements, to see whether the advert appeals to them or not. The approach is based on video data gathering using a static IP camera, storage and analysis, aiming to deliver real-time results. We use neural networks and support vector machines to determine facial microexpression. Results are correlated with information about the adverts displayed to be of use to advertising providers.","PeriodicalId":324813,"journal":{"name":"2020 12th International Conference on Electronics, Computers and Artificial Intelligence (ECAI)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126948666","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Bhat Snober Ali, Yashwant Singh, P. Singh, M. Răboacă
{"title":"Dynamic Access Control In Iot: Monitoring User Behavior Using Smart Contracts","authors":"Bhat Snober Ali, Yashwant Singh, P. Singh, M. Răboacă","doi":"10.1109/ECAI50035.2020.9223240","DOIUrl":"https://doi.org/10.1109/ECAI50035.2020.9223240","url":null,"abstract":"Dynamic Access Control in IoT (Internet of Things) through monitoring user behavior is a procedure that defines access control theory. Usually, an institution provides services to a user who owns a specific role that was issued by another institution. Such access control methods are possible in man-to-man communications only, but not in computer networks, because it is hard to establish security and limit spiteful actions through the users with high-risk values. High-risk values are caused by the users who do the tasks which they are not intended to do. In this paper, we bring forward a technique to limit malicious activities by monitoring user behavior using smart contracts. This proposed technique uses blockchain based technology and smart contracts for trust and the confirmation of user’s possession. We described the substructure, containing two main parts: smart contract and an authentication arrangement protocol.","PeriodicalId":324813,"journal":{"name":"2020 12th International Conference on Electronics, Computers and Artificial Intelligence (ECAI)","volume":"246 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115258192","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}