rss_2.0Computer Sciences FeedSciendo RSS Feed for Computer Sciences Sciences Feed control using TCP IP communication under LabVIEW USB6001 environment<abstract> <title style='display:none'>Abstract</title> <p>This article introduces a basic LED control using the USB6001 hardware, which is a LabVIEW product. It may be thought of as an extension device for real-time testing of simulation results. LabVIEW2014 is the software used. TCP is the communication technique, which has already been incorporated in LabVIEW via one of the communication modules. It might also be done on the same platform. There are two objects in this article, a server and a client, that may transport data or messages between these two applications. The Transmission Control Protocol governs the transmission process.</p> </abstract>ARTICLE2022-01-21T00:00:00.000+00:00A Survey on Automatic Design Methods for Swarm Robotics Systems<abstract> <title style='display:none'>Abstract</title> <p>Swarm robots are a branch of robotics that draws inspiration from biological swarms to mimic their collective behavior. Automatic design methods are part of swarm engineering, depend on artificial intelligence algorithms to produce the collective behavior of robots. In general, they follow two-approach evolutionary algorithms like practical swarm optimization and reinforcement learning. This paper studies these approaches, illustrating the effect of modifications and enhancements of algorithms for both directions, showing important parameters considered for the best performance of the swarm, and explaining the methods and advantages of using deep learning to reinforcement learning.</p> </abstract>ARTICLE2022-01-21T00:00:00.000+00:00A survey for Communication security of the embedded system<abstract> <title style='display:none'>Abstract</title> <p>The embedded operating system is a task-oriented computing platform that can be tailored, low-cost, and has high requirements for reliability and real-time performance. It plays an extremely important role in engineering applications. With the gradual application of embedded systems in various fields, the shortcomings of its insufficient ability to respond to security threats have gradually emerged, and many hackers have turned their attack targets into embedded systems. The important reason for these attacks is that embedded systems lack sufficient multi-layer protection mechanisms. This article focuses on the threats embedded systems face in terms of communication security. Then analyze the existing communication security-related technologies from the perspectives of the network layer, the transport layer, and the application layer. Finally, it summarizes the research direction of embedded system security countermeasures.</p> </abstract>ARTICLE2022-01-21T00:00:00.000+00:00Environmental Parameters Monitoring System<abstract> <title style='display:none'>Abstract</title> <p>The project presents the development of a system for monitoring environmental parameters. At the base of this system is the ESP-32S board that collects, processes and transmits data from the three sensors to the two web interfaces. The role of these web interfaces is to display the data collected from the sensors. The local web interface consists of two windows, the first window contains the table of sensors that displays the data measured by the sensors at that time. In the second window you can see the data measured by the sensors through graphs. They store the sensor data, giving the user the ability to view previously measured data. The local web interface provides sensor data only in the Wi-Fi network coverage area, and its data is deleted when the server is closed. The global web interface displays data using graphs. At the base of this web interface is the ThingSpeak platform that allows the system to transmit data anywhere in the world, store data in the Cloud space and the possibility of using special analysis functions.</p> </abstract>ARTICLE2022-01-21T00:00:00.000+00:00Real-Time Identification from Gait Features Using Cascade Voting Method<abstract> <title style='display:none'>Abstract</title> <p>There are several biometric methods for identification. These are generally classified under two main groups as physiological and behavioural biometric methods. Recently, methods using behavioural biometric features have gained popularity. Identification made using gait pattern is also one of these methods. The present study proposes a machine learning based system performing identification in real time via gait features using a Kinect device. The data set is composed of 23 individuals’ skeleton model data obtained by the authors. From these data, 147 handcrafted features have been extracted. Deep Neural Network (DNN), Random Forest (RF), Gradient Boosting (GB), XG-Boost (XGB) and <italic>K</italic>-Nearest Neighbour (KNN) classifiers have been trained with these features. Furthermore, the output of these five machine learning models has been combined with a voting approach. The highest classification has been obtained with 97.5 % accuracy via a voting approach. The classification accuracies of the RF, DNN, XGB, GB and KNN classifiers are 95 %, 87.5 %, 85 %, 80 % and 65 %, respectively. The classification accuracy obtained via a voting approach is higher than in the previous studies. The developed system successfully performs real-time identification.</p> </abstract>ARTICLE2021-12-30T00:00:00.000+00:00Text Tone Determination Using Fuzzy Logic<abstract> <title style='display:none'>Abstract</title> <p>The study proposes the text tone detection system based on sentiment dictionaries and fuzzy rules. Computer analysis of texts from different sources has been performed in emotional categories: anger, anticipation, disgust, fear, joy, sadness, surprise and trust. A synonym dictionary has been used to expand the vocabulary. To increase the accuracy and validity of sentiment analysis, the authors of the study have used coefficients that take into account different emotional loads of words of various parts of speech and the action of intensifying or softening adverbs. A quantitative value of the text tone has been obtained as a result of an aggregation of normalized data on all emotional categories by the fuzzy inference methods. It has been found that emotional words have a greater impact on the text tone value in the case of analysis of short messages. The proposed approach makes it possible to contribute to all emotional categories in the final text evaluation.</p> </abstract>ARTICLE2021-12-30T00:00:00.000+00:00Curriculum Learning for Age Estimation from Brain MRI<abstract> <title style='display:none'>Abstract</title> <p>Age estimation from brain MRI has proved to be considerably helpful in early diagnosis of diseases such as Alzheimer’s and Parkinson’s. In this study, curriculum learning effect on age estimation models was measured using a brain MRI dataset consisting of normal and anomaly data. Three different strategies were selected and compared using 3D Convolutional Neural Networks as the Deep Learning architecture. The strategies were as follows: (1) model training performed only on normal data, (2) model training performed on the entire dataset, (3) model training performed on normal data first and then further training on the entire dataset as per curriculum learning. The results showed that curriculum learning improved results by 20 % compared to traditional training strategies. These results suggested that in age estimation tasks datasets consisting of anomaly data could also be utilized to improve performance.</p> </abstract>ARTICLE2021-12-30T00:00:00.000+00:00Solution to On-line vs On-site Work Efficiency Analysis on the Example of Engineering System Designer Work<abstract> <title style='display:none'>Abstract</title> <p>Day-to-day working activities have been heavily altered by COVID-19 pandemic, forcing a transition from traditional on-site work to on-line telework across the whole world. It has become much harder to efficiently organise, guide and evaluate employee’s work. There are different factors that can influence “work from home” quality, and many of these affect such work negatively. A set of relevant methods and tools should be developed which could improve this situation. The goal of the study is to summarise related background of this problem and to propose an approach to overcoming this problem. To achieve the goal, design engineer’s work is evaluated in an appropriate environment (e.g., AutoCAD, etc.) using automated analysis and visualization of IS auditing data.</p> </abstract>ARTICLE2021-12-30T00:00:00.000+00:00Academic Performance Modelling with Machine Learning Based on Cognitive and Non-Cognitive Features<abstract> <title style='display:none'>Abstract</title> <p>The academic performance of students is essential for academic progression at all levels of education. However, the availability of several cognitive and non-cognitive factors that influence students’ academic performance makes it challenging for academic authorities to use conventional analytical tools to extract hidden knowledge in educational data. Therefore, Educational Data Mining (EDM) requires computational techniques to simplify planning and determining students who might be at risk of failing or dropping from school due to academic performance, thus helping resolve student retention. The paper studies several cognitive and non-cognitive factors such as academic, demographic, social and behavioural and their effect on student academic performance using machine learning algorithms. Heterogenous lazy and eager machine learning classifiers, including Decision Tree (DT), <italic>K</italic>-Nearest-Neighbour (KNN), Artificial Neural Network (ANN), Logistic Regression (LR), Random Forest (RF), AdaBoost and Support Vector Machine (SVM) were adopted and training was performed based on k-fold (<italic>k</italic> = 10) and leave-one-out cross-validation. We evaluated their predictive performance using well-known evaluation metrics like Area under Curve (AUC), F-1 score, Precision, Accuracy, Kappa, Matthew’s correlation coefficient (MCC) and Recall. The study outcome shows that Student Absence Days (SAD) are the most significant predictor of students’ academic performance. In terms of prediction accuracy and AUC, the RF (Acc = 0.771, AUC = 0.903), LR (Acc = 0.779, AUC = 0.90) and ANN (Acc = 0.760, AUC = 0.895) outperformed all other algorithms (KNN (Acc = 0.638, AUC = 0.826), SVM (Acc = 0.727, AUC = 0.80), DT (Acc = 0.733, AUC = 0.876) and AdaBoost (Acc = 0.748, AUC = 0.808)), making them more suitable for predicting students’ academic performance.</p> </abstract>ARTICLE2021-12-30T00:00:00.000+00:00The Process of Data Validation and Formatting for an Event-Based Vision Dataset in Agricultural Environments<abstract> <title style='display:none'>Abstract</title> <p>In this paper, we describe our team’s data processing practice for an event-based camera dataset. In addition to the event-based camera data, the Agri-EBV dataset contains data from LIDAR, RGB, depth cameras, temperature, moisture, and atmospheric pressure sensors. We describe data transfer from a platform, automatic and manual validation of data quality, conversions to multiple formats, and structuring of the final data. Accurate time offset estimation between sensors achieved in the dataset uses IMU data generated by purposeful movements of the sensor platform. Therefore, we also outline partitioning of the data and time alignment calculation during post-processing.</p> </abstract>ARTICLE2021-12-30T00:00:00.000+00:00Determining and Measuring the Amount of Region Having COVID-19 on Lung Images<abstract> <title style='display:none'>Abstract</title> <p>It is important to know how much the lungs are affected in the course of the disease in patients with COVID-19. Detecting infected tissues on CT lung images not only helps diagnose the disease but also helps measure the severity of the disease. In this paper, using the hybrid artificial intelligence-based segmentation method, which we call TA-Segnet, it has been revealed how the region with COVID-19 affects the lung on 2D CT images. A hybrid convolutional neural network-based segmentation method (TA-Segnet) has been developed for this process. We use “COVID-19 CT Lung and Infection Segmentation Dataset” and “COVID-19 CT Segmentation Dataset” to evaluate TA-SegNET. At first, the tissues with COVID-19 on each lung image are determined, then the measurements obtained are evaluated according to the parameters of Accuracy, Dice, Jaccard, Mean Square Error, Mutual Information and Cross-correlation. Accuracy, Dice, Jaccard, Mean Square Error, Mutual Information and Cross-correlation values for data set-1 are 98.63 %, 0.95, 0.919, 0.139, 0.51, and 0.904, respectively. For data set-2, these parameters are 98.57 %, 0.958, 0.992, 0.0088, 0.565 and 0.8995, respectively. Second, the ratio of COVID-19 regions relative to the lung region on CT images is determined. This ratio is compared with the values in the original data set. The results obtained show that such an artificial intelligence-based method during the pandemic period will help prioritize and automate the diagnosis of COVID-19 patients.</p> </abstract>ARTICLE2021-12-30T00:00:00.000+00:00Time Series Forecasting of Mobile Robot Motion Sensors Using LSTM Networks<abstract> <title style='display:none'>Abstract</title> <p>Deep neural networks are a tool for acquiring an approximation of the robot mathematical model without available information about its parameters. This paper compares the LSTM, stacked LSTM and phased LSTM architectures for time series forecasting. In this paper, motion sensor data from mobile robot driving episodes are used as the experimental data. From the experiment, the models show better results for short-term prediction, where the LSTM stacked model slightly outperforms the other two models. Finally, the predicted and actual trajectories of the robot are compared.</p> </abstract>ARTICLE2021-12-30T00:00:00.000+00:00Evaluation of Fingerprint Selection Algorithms for Two-Stage Plagiarism Detection<abstract> <title style='display:none'>Abstract</title> <p>Generally, the process of plagiarism detection can be divided into two main stages: source retrieval and text alignment. The paper evaluates and compares effectiveness of five fingerprint selection algorithms used during the source retrieval stage: <italic>Every p-th</italic>, <italic>0 mod p</italic>, <italic>Winnowing</italic>, <italic>Frequency-biased Winnowing</italic> (<italic>FBW</italic>) and <italic>Modified FBW</italic> (<italic>MFBW</italic>). The algorithms are evaluated on a dataset containing plagiarism cases in Bachelor and Master Theses written in English in the field of computer science. The best performance is reached by <italic>0 mod p</italic>, <italic>Winnowing</italic> and <italic>MFBW</italic>. For these algorithms, reduction of fingerprint size from 100 % to about 20 % kept the effectiveness at approximately the same level. Moreover, <italic>MFBW</italic> sends overall fewer document pairs to the text alignment stage, thus also reducing the computational cost of the process. The software developed for this study is freely available at the author’s website <ext-link ext-link-type="uri" xmlns:xlink="" xlink:href=""></ext-link>.</p> </abstract>ARTICLE2021-12-30T00:00:00.000+00:00Adversarial Attacks and Defense Technologies on Autonomous Vehicles: A Review<abstract> <title style='display:none'>Abstract</title> <p>In recent years, various domains have been influenced by the rapid growth of machine learning. Autonomous driving is an area that has tremendously developed in parallel with the advancement of machine learning. In autonomous vehicles, various machine learning components are used such as traffic lights recognition, traffic sign recognition, limiting speed and pathfinding. For most of these components, computer vision technologies with deep learning such as object detection, semantic segmentation and image classification are used. However, these machine learning models are vulnerable to targeted tensor perturbations called adversarial attacks, which limit the performance of the applications. Therefore, implementing defense models against adversarial attacks has become an increasingly critical research area. The paper aims at summarising the latest adversarial attacks and defense models introduced in the field of autonomous driving with machine learning technologies up until mid-2021.</p> </abstract>ARTICLE2021-12-30T00:00:00.000+00:00A Cognitive Rail Track Breakage Detection System Using Artificial Neural Network<abstract> <title style='display:none'>Abstract</title> <p>Rail track breakages represent broken structures consisting of rail track on the railroad. The traditional methods for detecting this problem have proven unproductive. The safe operation of rail transportation needs to be frequently monitored because of the level of trust people have in it and to ensure adequate maintenance strategy and protection of human lives and properties. This paper presents an automatic deep learning method using an improved fully Convolutional Neural Network (FCN) model based on <italic>U</italic>-Net architecture to detect and segment cracks on rail track images. An approach to evaluating the extent of damage on rail tracks is also proposed to aid efficient rail track maintenance. The model performance is evaluated using precision, recall, F1-Score, and Mean Intersection over Union (MIoU). The results obtained from the extensive analysis show <italic>U</italic>-Net capability to extract meaningful features for accurate crack detection and segmentation.</p> </abstract>ARTICLE2021-12-30T00:00:00.000+00:00Distance Sensor and Wheel Encoder Sensor Fusion Method for Gyroscope Calibration<abstract> <title style='display:none'>Abstract</title> <p>MEMS gyroscopes are widely used as an alternative to the more expensive industrial IMUs. The instability of the lower cost MEMS gyroscopes creates a large demand for calibration algorithms. This paper provides an overview of existing calibration methods and describes the various types of errors found in gyroscope data. The proposed calibration method for gyroscope constants provides higher accuracy than datasheet constants. Furthermore, we show that using a different constant for each direction provides even higher accuracy.</p> </abstract>ARTICLE2021-12-30T00:00:00.000+00:00Solution to Analysis of IT System User Behaviour Using AI/ML Algorithms<abstract> <title style='display:none'>Abstract</title> <p>Insufficient user involvement, lack of user feedback, incomplete and changing user requirements are some of the critical reasons for the difficulty of IS usage, which could potentially reduce the number of customers. Under the previous authors’ research, the method for analysing the behaviour of IT system users was developed, which was intended to improve the usability of the system and thus could increase the efficiency of business processes. The developed method is based on the use of graph searching algo rithms, Markov chains and Machine Learning approach. This paper focuses on detailing of method output data in the context of definition of their importance based on expert evaluation and demonstration of visual presentation of different UX analysis situations. The paper briefly reminds the essence of the method, including both the input and output data sets, and, with the help of experts, evaluates the expected result in the context of their importance in UX analysis. It also introduces visualization prototype developed to obtain the output data, which allows verifying the input/output data transformation possibilities and expected data acquisition potential.</p> </abstract>ARTICLE2021-12-30T00:00:00.000+00:00Fog Computing Algorithms: A Survey and Research Opportunities<abstract> <title style='display:none'>Abstract</title> <p>The classic Internet of Things-Cloud Computing model faces challenges like high response latency, high bandwidth consumption, and high storage requirement with increasing velocity and volume of generated data. Fog computing offers better services to end users by bringing processing, storage, and networking closer to them. Recently, there has been significant research addressing architectural and algorithmic aspects of fog computing. In the existing literature, a systematic study of architectural designs is widely conducted for various applications. Algorithms are seldom examined. Algorithms play a crucial role in fog computing. This survey aims to performing a comparative study of existing algorithms. The study also presents a systematic classification of the current fog computing algorithms and highlights the key challenges and research issues associated with them.</p> </abstract>ARTICLE2021-12-30T00:00:00.000+00:00Evaluation of Word Embedding Models in Latvian NLP Tasks Based on Publicly Available Corpora<abstract> <title style='display:none'>Abstract</title> <p>Nowadays, natural language processing (NLP) is increasingly relaying on pre-trained word embeddings for use in various tasks. However, there is little research devoted to Latvian – a language that is much more morphologically complex than English. In this study, several experiments were carried out in three NLP tasks on four different methods of creating word embeddings: word2vec, fastText, Structured Skip-Gram and ngram2vec. The obtained results can serve as a baseline for future research on the Latvian language in NLP. The main conclusions are the following: First, in the part-of-speech task, using a training corpus 46 times smaller than in a previous study, the accuracy was 91.4 % (versus 98.3 % in the previous study). Second, fastText demonstrated the overall best effectiveness. Third, the best results for all methods were observed for embeddings with a dimension size of 200. Finally, word lemmatization generally did not improve results.</p> </abstract>ARTICLE2021-12-30T00:00:00.000+00:00An analysis of coal consumption, CO emissions and economic growth in Slovenia<abstract><title style='display:none'>Abstract in English</title><p>The common characteristics and possible correlations between coal consumption, CO<sub>2</sub> emissions, emission productivity and economic growth in Slovenia are discussed in this article. The correlation between these variables was analysed by using the Pearson correlation coefficient, and we used linear regression and the least squares method to develop predictive mathematical models that can be used to estimate trends in coal consumption and CO<sub>2</sub> emissions in the future. The link between coal consumption, emissions, and emission productivity is significant, while the correlation between coal consumption and economic growth is minimal. Therefore, coal consumption and the resulting emissions do not have a significant impact on economic growth. Mathematical models show a good fit, which is a condition for the reliability of the prediction. Possible scenarios of the transition to carbon neutrality and the related problems of future electricity supply as a consequence of the cessation of coal mining and use are also discussed below.</p></abstract>ARTICLE2021-12-30T00:00:00.000+00:00en-us-1