{"title":"Performance Evaluation of Traffic Congestion Detection Algorithms in Real-Life Scenarios","authors":"Mohammad Bawaneh, V. Simon","doi":"10.1109/INFOTEH53737.2022.9751328","DOIUrl":"https://doi.org/10.1109/INFOTEH53737.2022.9751328","url":null,"abstract":"Traffic congestion in urban cities has substantial economic and social effects. Roads in urban cities have become more and more crowded. However, it is challenging to upgrade the cities' infrastructure and open new roads for traffic. There-fore, Intelligent Transportation Systems (ITS) introduce Artificial Intelligence (AI) based solutions to help keep the traffic flow in a free state. Identifying the traffic congestions in real-time is critical in ITS solutions as it can provide time to prevent the congestions' transitions through the city road network. In our previous work, we have proposed three novel algorithms to detect the congestions in real-time [1], [2]. The algorithms were verified using synthetic traffic data. In this paper, their performance evaluation using real-life data from the state of California [3] is introduced. The experimental results show that the algorithms are capable to be utilized in real-life scenarios. Our algorithms overperformed the other methods from the literature in terms of detection rate and false alarm rate. Moreover, they have achieved the best performance in terms of detection time by identifying the congestions faster than the other algorithms, which is crucial for the city traffic operators to intervene on time to avoid the transition of the congestion to other roads' sections.","PeriodicalId":6839,"journal":{"name":"2022 21st International Symposium INFOTEH-JAHORINA (INFOTEH)","volume":"115 1","pages":"1-8"},"PeriodicalIF":0.0,"publicationDate":"2022-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90347640","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Strategies for Jamming in Discrete Frequency Subbands - Characteristics and Main Applications","authors":"A. Lebl, P. Petrovic, J. Radivojević","doi":"10.1109/INFOTEH53737.2022.9751254","DOIUrl":"https://doi.org/10.1109/INFOTEH53737.2022.9751254","url":null,"abstract":"The progress in applied techniques to cause more human victims and material damage is obvious every day. Two of such sources are remote controlled improvised explosive devices and drones for malicious purposes. The frequencies and message bit rates for necessary signals transmission of such devices are continually increasing thus leading to efficiency decrease of classical jamming techniques, especially pure sweep jamming. In this paper we analyze comb jamming and sweep jamming with discrete subbands as two techniques to overcome this problem. IRITEL is one of the pioneers in the world in the implementation of both strategies. In the first case several discrete frequency components are swept in the same time and thus the sweep rate is effectively increased. The second technique is well suited to be implemented when signal frequencies and signal levels to be jammed are a priori known.","PeriodicalId":6839,"journal":{"name":"2022 21st International Symposium INFOTEH-JAHORINA (INFOTEH)","volume":"2 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2022-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85409211","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Tactile Internet in Future Industrial Automation Applications","authors":"N. Popovic","doi":"10.1109/INFOTEH53737.2022.9751306","DOIUrl":"https://doi.org/10.1109/INFOTEH53737.2022.9751306","url":null,"abstract":"Industrial automation has gone through serious transformation from early years until now. Recently, it incorporated Internet, Internet of Things, cyber-physical systems and wired/wireless communication network, but all of these have certain limitations regarding latency, data rate, reliability and real-time connectivity that disenable future industrial applications. On the way of meeting the Industry 4.0 requirements, ultra-reliable and low latency communication networks should be used, and as a solution to this, Tactile Internet is recognized. Tactile Internet is envisioned to fully provide human-to-machine interaction as one of the ideas of smart manufacturing and smart factories. This paper deals with Tactile Internet characteristics, requirements and architecture, and studies the possibilities of how it might change the future industrial automation applications.","PeriodicalId":6839,"journal":{"name":"2022 21st International Symposium INFOTEH-JAHORINA (INFOTEH)","volume":"19 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2022-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84588618","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Application Features of the Correlation Measurement Method in Ultrasonic Liquid Flowmeters at a Low Sampling Rate of Signals","authors":"S. Gerasimov, V. Glushnev","doi":"10.1109/INFOTEH53737.2022.9751299","DOIUrl":"https://doi.org/10.1109/INFOTEH53737.2022.9751299","url":null,"abstract":"The proposed article is considered to the correlation method analysis for measuring informative parameters - the propagation times of ultrasonic probing signals in flowmeters, taking into account individual features. The article investigates the sources of propagation time measurement error, determines the requirements for the probing signals shape and algorithms for their digital processing. The method consists in determining the maximum's position of the cross-correlation function for the probing signals. The flow measurement accuracy is primarily characterized by the fractional part of the propagation time's difference estimation. This is realized by the correlation function interpolation in its main maximum region. An interpolation error occurs, when the peak's position determining. Reducing the time shift calculating error is achieved using correct signal truncation.","PeriodicalId":6839,"journal":{"name":"2022 21st International Symposium INFOTEH-JAHORINA (INFOTEH)","volume":"18 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2022-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81426206","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Accuracy Assessment of Structured-Light Based Industrial Optical Scanner","authors":"Vedran Jovanovic, Velibor Đalić, P. Maric","doi":"10.1109/INFOTEH53737.2022.9751291","DOIUrl":"https://doi.org/10.1109/INFOTEH53737.2022.9751291","url":null,"abstract":"This paper presents accuracy assessment of structured light based industrial optical scanner. Comet LED 5M scanner, as an active stereo system, is calibrated using different approaches, and the impact of the calibration results on the system accuracy is verified in experiments. Besides predefined system accuracy verification, an additional method is proposed, and the obtained results were compared. Experimental results show that the system fulfills highly rigorous requirements, even in not strictly controlled environment, thus making it very suitable for use in, not only industrial but also in high precision and high sensitive applications.","PeriodicalId":6839,"journal":{"name":"2022 21st International Symposium INFOTEH-JAHORINA (INFOTEH)","volume":"78 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2022-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74214597","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Integrated video-based bee counting and multi-sensors platform for remote bee yard monitoring","authors":"V. Starčević, M. Simić, V. Risojevic, Z. Babic","doi":"10.1109/INFOTEH53737.2022.9751284","DOIUrl":"https://doi.org/10.1109/INFOTEH53737.2022.9751284","url":null,"abstract":"Beehive monitoring systems are very important for understanding behavior of bees and to have a better overview of environmental parameters impact on their activities. Such information is very useful for agriculture, but in saving bees as well. Although there are various systems for monitoring beehives, there is still a growing need for low-cost monitoring solutions. In this paper we proposed an integrated system for video-based honey bee counting and a multi-sensors platform for environmental parameters monitoring. The honey bees counting system aims to evaluate foraging activity of bees through the number of honey bees exiting and entering the beehive, while the multi-sensors platform is used for remote monitoring of environmental parameters near the beehive. The proposed electronic system for remote monitoring of environmental parameters in a bee yard has specific features such as battery-power supply, portability, and a unit for transmitting data to the remote server. On a relatively small data set, that includes measured and acquisitioned environmental parameters as well as counted honey bees, we have shown how effort of honey bees is coupled to the coincident environmental parameters near the hive.","PeriodicalId":6839,"journal":{"name":"2022 21st International Symposium INFOTEH-JAHORINA (INFOTEH)","volume":"25 4 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2022-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83601171","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Reverse Engineering of Relational Database Schema based on Universal Metadata Queries","authors":"Stefan Reljic, D. Brdjanin, G. Banjac","doi":"10.1109/INFOTEH53737.2022.9751287","DOIUrl":"https://doi.org/10.1109/INFOTEH53737.2022.9751287","url":null,"abstract":"The paper presents an approach to reverse engineering of a relational database schema. The approach enables database schema extraction from the corresponding metadata stored in the data dictionary by executing a universal set of queries regardless of the source database management system. The concrete queries are generated by combining predefined templates with concrete metadata for the particular source system. Based on the proposed approach, we implemented a software tool and experimentally validated it. The implemented solution enables reverse engineering of relational databases managed by several contemporary database management systems.","PeriodicalId":6839,"journal":{"name":"2022 21st International Symposium INFOTEH-JAHORINA (INFOTEH)","volume":"41 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2022-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85320566","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Intrusion Detection Systems in Smart Grid","authors":"S. B. Rakas, V. Timčenko, M. Kabović, A. Kabović","doi":"10.1109/INFOTEH53737.2022.9751302","DOIUrl":"https://doi.org/10.1109/INFOTEH53737.2022.9751302","url":null,"abstract":"This paper describes smart grid with a hierarchical communication architecture consisting of three layers. Such a network faces various cyber security challenges, which can lead to serious problems in the power grid. Smart grid's cyber security has been addressed with short description of the cyber attacks and vulnerabilities. As one of the effective ways to prevent these attacks, intrusion detection systems (IDSs) have been considered, with the emphasis on intrusion detection techniques as well as parameters that indicate the effectiveness of the IDS. Finally, the requirements for the application of IDSs in smart grid environment have been described.","PeriodicalId":6839,"journal":{"name":"2022 21st International Symposium INFOTEH-JAHORINA (INFOTEH)","volume":"14 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2022-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89654609","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}