2022 XXVIII International Conference on Information, Communication and Automation Technologies (ICAT)最新文献

筛选
英文 中文
Prediction of cardiovascular disease 心血管疾病预测
Fejsal Perva, Harun Tucakovic, Muhammed Musanovic, Emine Yaman
{"title":"Prediction of cardiovascular disease","authors":"Fejsal Perva, Harun Tucakovic, Muhammed Musanovic, Emine Yaman","doi":"10.1109/ICAT54566.2022.9811108","DOIUrl":"https://doi.org/10.1109/ICAT54566.2022.9811108","url":null,"abstract":"Nowadays, cardiovascular diseases are one of the leading causes of death. Earlier and better detection of such diseases would lead to earlier treatment and eventually to better chances of patients being able to overcome those diseases. Machine learning algorithms have been proven useful in detecting several medical conditions based on patients’ characteristics. In this paper, we are trying to predict whether a patient has a cardiovascular disease based on their characteristics. Using decision trees (C4.5), k-NN, and Naïve Bayes, in combination with cross-validation and holdout methods, we were able to achieve relatively good results. Even better results were achieved, for some specific cases such as patients having hypertension stage 2 or 3.","PeriodicalId":414786,"journal":{"name":"2022 XXVIII International Conference on Information, Communication and Automation Technologies (ICAT)","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115809313","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Alternator with controllable frequency and amplitude 频率和幅度可控的交流发电机
V. Utkin, Isaac Chairez
{"title":"Alternator with controllable frequency and amplitude","authors":"V. Utkin, Isaac Chairez","doi":"10.1109/ICAT54566.2022.9811125","DOIUrl":"https://doi.org/10.1109/ICAT54566.2022.9811125","url":null,"abstract":"The article discusses two types of power converters for obtaining sinusoidal signals at the output with the desired amplitude and frequency. In the first case, the source of energy is a constant voltage, in the second - a three-phase voltage source. In both cases, the output value of the converter is a sinusoidal voltage without higher harmonics. In the second version, the power factor of the consumed energy is one. Low power part of the alternator is nonlinear dynamic system generating the desired signal in sliding mode. Then the signal is tracked in high power part in sliding mode as well.","PeriodicalId":414786,"journal":{"name":"2022 XXVIII International Conference on Information, Communication and Automation Technologies (ICAT)","volume":"95 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121578747","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Human-like Hitting Strategies for a Ball Bouncing Robot 弹球机器人的类人击球策略
Chi-Cheng Cheng, Yi-Min Chiu, An Liu
{"title":"Human-like Hitting Strategies for a Ball Bouncing Robot","authors":"Chi-Cheng Cheng, Yi-Min Chiu, An Liu","doi":"10.1109/ICAT54566.2022.9811237","DOIUrl":"https://doi.org/10.1109/ICAT54566.2022.9811237","url":null,"abstract":"Hand-eye coordination control is one of the dexterous operational skills of mankind. This study reproduces human-like hitting strategies based on hand-eye coordination techniques for bouncing a ping pong ball with a robotic manipulator holding a paddle and an RGB-D camera. The target ball and the background are first separated by using the color information. The target ball’s position in the world coordinate frame can therefore be obtained by incorporating the depth information. Analysis of forces exerted on the ball is able to predict its future motion trajectory. In addition, a to-the-center and an adaptive learning hitting strategies based on manipulation skills of humans are developed to overcome difficulties caused by uncertainties and unknown parameters for the successive bouncing task. The to-the-center strategy tends to bounce the ball towards the center of the paddle, not just vertically upwards in a classical approach, in order to maintain the ball in the reachable region. However, the adaptive learning strategy provides controls of the inclination and the hitting force for the paddle according to previous bounce behavior of the ball. Actual bouncing experiments with a three degrees-of-freedom robotic wrist were conducted using three different bouncing strategies: the classical vertical approach, the to-the-center strategy, and the adaptive learning strategy. Experimental results demonstrate that the proposed adaptive learning hitting strategy displays best bouncing performance in terms of average bouncing number of times and average distance of contact point away from the center.","PeriodicalId":414786,"journal":{"name":"2022 XXVIII International Conference on Information, Communication and Automation Technologies (ICAT)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122201959","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
3D UAV Registration of Large Scale Environment Using Structure From Motion Based Approach 基于运动结构的大尺度环境三维无人机配准
J. Velagić, Haris Balta
{"title":"3D UAV Registration of Large Scale Environment Using Structure From Motion Based Approach","authors":"J. Velagić, Haris Balta","doi":"10.1109/ICAT54566.2022.9811227","DOIUrl":"https://doi.org/10.1109/ICAT54566.2022.9811227","url":null,"abstract":"This paper treats the problem of 3D outdoor environment mapping using images acquired by Unmanned Aerial Vehicle (UAV). The main focus is on the generation of 3D model for large scale environments. In order to perform 3D model reconstruction and mapping from 2D aerial images we employed a Structure from Motion (SfM) based approach. The obtained results using this approach for different scenarios, the rubble field and village, are presented. The generated UAV 3D point cloud data are compared with the ground truth using the least square method, where the ground truth represents a reference model with high accuracy geodetic precision. The comparison of the 3D environment models with the rubble field and village scenarios and the ground truth data is also given.","PeriodicalId":414786,"journal":{"name":"2022 XXVIII International Conference on Information, Communication and Automation Technologies (ICAT)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122722654","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Improvement of Confidential Messages Secure Routing over Paths with Intersection in Cyber Resilient Networks 网络弹性网络中具有交叉路径的机密信息安全路由改进
Oleksandr V Lemeshko, Oleksandra Yeremenko, A. Mersni, J. Gazda
{"title":"Improvement of Confidential Messages Secure Routing over Paths with Intersection in Cyber Resilient Networks","authors":"Oleksandr V Lemeshko, Oleksandra Yeremenko, A. Mersni, J. Gazda","doi":"10.1109/ICAT54566.2022.9811191","DOIUrl":"https://doi.org/10.1109/ICAT54566.2022.9811191","url":null,"abstract":"The paper presents an improved method of confidential messages secure routing over intersecting paths in cyber resilient networks. It allows making fuller use of the available network resources. Within the method, the level of network security of routes, networks, and confidential messages, in general, was assessed due to the compromise probability of the network links. In turn, the message compromise probability is calculated by the formula of total probability, considering the level of network security of bridges in the network structure without prior calculation of disjoint paths set. According to the numerical study results of the method application, the most significant gain in terms of the message compromise probability has been obtained at a relatively low level of cyber threats in the network. The secure routing method was implemented and presented by software prototypes of secure routing protocols that can form the basis of advanced routing protocols supporting network security metrics.","PeriodicalId":414786,"journal":{"name":"2022 XXVIII International Conference on Information, Communication and Automation Technologies (ICAT)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125958202","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Semantic Mapping System Based on Scene Classification for Indoor Mobile Robots 基于场景分类的室内移动机器人语义映射系统
Xueyuan Song, Xu Liang, Zhijiang Zuo, Huaidong Zhou
{"title":"A Semantic Mapping System Based on Scene Classification for Indoor Mobile Robots","authors":"Xueyuan Song, Xu Liang, Zhijiang Zuo, Huaidong Zhou","doi":"10.1109/ICAT54566.2022.9811222","DOIUrl":"https://doi.org/10.1109/ICAT54566.2022.9811222","url":null,"abstract":"With the increasingly complex application scenarios of indoor mobile robots, traditional navigation methods based on metric maps have been unable to meet people’s needs. Mobile robots not only need to perceive the spatial geometric information of the environment, but also need to deeply and comprehensively understand the semantic information of the environment in order to perform tasks such as complex behavioral decision-making and human-computer interaction. In this paper, we propose a semantic mapping system for indoor environments based on a monocular camera and a laser. The semantic mapping system adopts the technique of scene classification to construct the scene semantics of indoor environments, in which the semantic classifier is embedded into a recurrent neural network to better learn the correlation of consecutive frames. Experimental results indicate that the proposed semantic mapping system exhibits great performance in the robustness and accuracy of semantic mapping.","PeriodicalId":414786,"journal":{"name":"2022 XXVIII International Conference on Information, Communication and Automation Technologies (ICAT)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128905211","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Explorative Evaluation of Heart Rate Variability Spectral Analysis Approaches 心率变异性频谱分析方法的探索性评价
A. Tihak, Nahla Salaka, D. Boskovic
{"title":"Explorative Evaluation of Heart Rate Variability Spectral Analysis Approaches","authors":"A. Tihak, Nahla Salaka, D. Boskovic","doi":"10.1109/ICAT54566.2022.9811134","DOIUrl":"https://doi.org/10.1109/ICAT54566.2022.9811134","url":null,"abstract":"The application of spectral analysis methods to the heart rate (HR) signal is challenging due to the nature of the signal itself, which is non-uniform. Methods for non-uniform signals can be applied directly, whilst the methods designed for uniform signals can be used after the signal is adequately preprocessed beforehand. Preprocessing consists of interpolation and resampling. In this paper, we have implemented a tool for explorative evaluation of various spectral analysis methods applied to HR signal. The tool is based on heat maps used for visualization of frequency metrics for the ECG signals selected from the MIT-BIH Arrhythmia Database. Evaluated methods are the Lomb-Scargle method for nonuniform signal analysis and Welch's method which is applied in conjunction with different interpolation approaches. A set of frequency-domain metrics are evaluated with the proposed tool for exploratory analysis. The evaluation indicates that the Lomb-Scargle method produces a loss of information in certain frequency bands. Furthermore, Welch method better demonstrates the difference in spectral power metrics for frequency bands of interest, irrespective of the type of interpolation used.","PeriodicalId":414786,"journal":{"name":"2022 XXVIII International Conference on Information, Communication and Automation Technologies (ICAT)","volume":"112 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133516633","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Simulations of Denial of Service Attacks in Quantum Key Distribution Networks 量子密钥分发网络中拒绝服务攻击的模拟
E. Dervisevic, Filip Lauterbach, Patrik Burdiak, J. Rozhon, Martina Slívová, Matej Plakalovic, M. Hamza, P. Fazio, M. Voznák, M. Mehic
{"title":"Simulations of Denial of Service Attacks in Quantum Key Distribution Networks","authors":"E. Dervisevic, Filip Lauterbach, Patrik Burdiak, J. Rozhon, Martina Slívová, Matej Plakalovic, M. Hamza, P. Fazio, M. Voznák, M. Mehic","doi":"10.1109/ICAT54566.2022.9811238","DOIUrl":"https://doi.org/10.1109/ICAT54566.2022.9811238","url":null,"abstract":"A QKD network can be considered an add-on technology to a standard communication network that provides IT-secure cryptographic keys as a service. As a result, security challenges resulting in the suspension of functional work must be addressed. This study analyzes a Denial of Service (DoS) attack on the Key Management System (KMS), one of the critical components of the QKD network in charge of key management and key provisioning to authorized consumers. Through simulation methods performed in the QKDNetSim, we show that legitimate customers experience significantly worse service during an excessive DoS attack on KMS.","PeriodicalId":414786,"journal":{"name":"2022 XXVIII International Conference on Information, Communication and Automation Technologies (ICAT)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132066065","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Calculation of the Electric Field Intensity and Magnetic Flux Density Generated by High Voltage Overhead Transmission Lines 高压架空输电线路产生电场强度和磁通密度的计算
Ajdin Alihodžić, A. Mujezinović, E. Turajlić, Nedis Dautbašić
{"title":"Calculation of the Electric Field Intensity and Magnetic Flux Density Generated by High Voltage Overhead Transmission Lines","authors":"Ajdin Alihodžić, A. Mujezinović, E. Turajlić, Nedis Dautbašić","doi":"10.1109/ICAT54566.2022.9811190","DOIUrl":"https://doi.org/10.1109/ICAT54566.2022.9811190","url":null,"abstract":"This paper considers calculation methods for the electric field intensity and magnetic flux density in the vicinity of the overhead transmission lines, as well as the calculation of alternating current (AC) corona onset electric field intensity. Calculations within this paper are made using the 2D algorithms of Charge Simulation Method (CSM) and Biot-Savart (BS) law based method. In order to obtain more accurate results, calculations are made by representing each overhead transmission line conductor with a large number of electric and magnetic field sources. By applying this approach, bundle conductors can be represented in a more realistic way and also singularity problems can be avoided when calculating electric field intensity. The presented methods are applied to a real overhead transmission line configuration, and obtained results are compared with field measurement results over the lateral profile. For considered overhead transmission line, AC corona onset electric field intensity is calculated and compared with calculated electric field intensity on the conductor’s surface. A comparison of calculated and measured results shows that considered calculation methods give satisfactory results.","PeriodicalId":414786,"journal":{"name":"2022 XXVIII International Conference on Information, Communication and Automation Technologies (ICAT)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125794538","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Estimation of Washing Performance in Washing Machines with Neural Networks 用神经网络估计洗衣机的洗涤性能
Yakup Aktaş, Merve Acer Kalafat
{"title":"Estimation of Washing Performance in Washing Machines with Neural Networks","authors":"Yakup Aktaş, Merve Acer Kalafat","doi":"10.1109/ICAT54566.2022.9811214","DOIUrl":"https://doi.org/10.1109/ICAT54566.2022.9811214","url":null,"abstract":"There are many standard procedures that washing machines must provide. One of them is the washing performance, which shows the cleanliness of the laundry. This measurement, called the washing performance index, must meet the criteria determined according to the relevant standard in repeated tests. However, the washing and cleaning process is a complex process affected by many parameters such as mechanical effects, chemical effects, temperature, and amount of water. We propose an approach to determine the effect of these multi-parameter effects on washing performance and estimate the washing performance of the washing machine without the need for trial tests before the algorithm design. The approach uses artificial neural network algorithms to estimate washing performance by varying the relevant input parameters accurately. In order to establish the structure of the neural network, we have performed experimental tests on washing machines with different features and different input parameters and used them for training, validation, and test sets. According to the results obtained, it has been shown that it is possible to predict the washing performance index with neural networks accurately.","PeriodicalId":414786,"journal":{"name":"2022 XXVIII International Conference on Information, Communication and Automation Technologies (ICAT)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132828179","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信