Rivista e Edizione

Volume 33 (2023): Edizione 3 (September 2023)
Mathematical Modeling in Medical Problems (Special section, pp. 349-428), Urszula Foryś, Katarzyna Rejniak, Barbara Pękala, Agnieszka Bartłomiejczyk (Eds.)

Volume 33 (2023): Edizione 2 (June 2023)
Automation and Communication Systems for Autonomous Platforms (Special section, pp. 171-218), Zygmunt Kitowski, Paweł Piskur and Stanisław Hożyń (Eds.)

Volume 33 (2023): Edizione 1 (March 2023)
Image Analysis, Classification and Protection (Special section, pp. 7-70), Marcin Niemiec, Andrzej Dziech and Jakob Wassermann (Eds.)

Volume 32 (2022): Edizione 4 (December 2022)
Big Data and Artificial Intelligence for Cooperative Vehicle-Infrastructure Systems (Special section, pp. 523-599), Baozhen Yao, Shuaian (Hans) Wang and Sobhan (Sean) Asian (Eds.)

Volume 32 (2022): Edizione 3 (September 2022)
Recent Advances in Modelling, Analysis and Implementation of Cyber-Physical Systems (Special section, pp. 345-413), Remigiusz Wiśniewski, Luis Gomes and Shaohua Wan (Eds.)

Volume 32 (2022): Edizione 2 (June 2022)
Towards Self-Healing Systems through Diagnostics, Fault-Tolerance and Design (Special section, pp. 171-269), Marcin Witczak and Ralf Stetter (Eds.)

Volume 32 (2022): Edizione 1 (March 2022)

Volume 31 (2021): Edizione 4 (December 2021)
Advanced Machine Learning Techniques in Data Analysis (special section, pp. 549-611), Maciej Kusy, Rafał Scherer, and Adam Krzyżak (Eds.)

Volume 31 (2021): Edizione 3 (September 2021)

Volume 31 (2021): Edizione 2 (June 2021)

Volume 31 (2021): Edizione 1 (March 2021)

Volume 30 (2020): Edizione 4 (December 2020)

Volume 30 (2020): Edizione 3 (September 2020)
Big Data and Signal Processing (Special section, pp. 399-473), Joanna Kołodziej, Sabri Pllana, Salvatore Vitabile (Eds.)

Volume 30 (2020): Edizione 2 (June 2020)

Volume 30 (2020): Edizione 1 (March 2020)

Volume 29 (2019): Edizione 4 (December 2019)
New Perspectives in Nonlinear and Intelligent Control (In Honor of Alexander P. Kurdyukov) (special section, pp. 629-712), Julio B. Clempner, Enso Ikonen, Alexander P. Kurdyukov (Eds.)

Volume 29 (2019): Edizione 3 (September 2019)
Information Technology for Systems Research (special section, pp. 427-515), Piotr Kulczycki, Janusz Kacprzyk, László T. Kóczy, Radko Mesiar (Eds.)

Volume 29 (2019): Edizione 2 (June 2019)
Advances in Complex Cloud and Service Oriented Computing (special section, pp. 213-274), Anna Kobusińska, Ching-Hsien Hsu, Kwei-Jay Lin (Eds.)

Volume 29 (2019): Edizione 1 (March 2019)
Exploring Complex and Big Data (special section, pp. 7-91), Johann Gamper, Robert Wrembel (Eds.)

Volume 28 (2018): Edizione 4 (December 2018)

Volume 28 (2018): Edizione 3 (September 2018)

Volume 28 (2018): Edizione 2 (June 2018)
Advanced Diagnosis and Fault-Tolerant Control Methods (special section, pp. 233-333), Vicenç Puig, Dominique Sauter, Christophe Aubrun, Horst Schulte (Eds.)

Volume 28 (2018): Edizione 1 (March 2018)
Ediziones in Parameter Identification and Control (special section, pp. 9-122), Abdel Aitouche (Ed.)

Volume 27 (2017): Edizione 4 (December 2017)

Volume 27 (2017): Edizione 3 (September 2017)
Systems Analysis: Modeling and Control (special section, pp. 457-499), Vyacheslav Maksimov and Boris Mordukhovich (Eds.)

Volume 27 (2017): Edizione 2 (June 2017)

Volume 27 (2017): Edizione 1 (March 2017)

Volume 26 (2016): Edizione 4 (December 2016)

Volume 26 (2016): Edizione 3 (September 2016)

Volume 26 (2016): Edizione 2 (June 2016)

Volume 26 (2016): Edizione 1 (March 2016)

Volume 25 (2015): Edizione 4 (December 2015)
Special issue: Complex Problems in High-Performance Computing Systems, Editors: Mauro Iacono, Joanna Kołodziej

Volume 25 (2015): Edizione 3 (September 2015)

Volume 25 (2015): Edizione 2 (June 2015)

Volume 25 (2015): Edizione 1 (March 2015)
Safety, Fault Diagnosis and Fault Tolerant Control in Aerospace Systems, Silvio Simani, Paolo Castaldi (Eds.)

Volume 24 (2014): Edizione 4 (December 2014)

Volume 24 (2014): Edizione 3 (September 2014)
Modelling and Simulation of High Performance Information Systems (special section, pp. 453-566), Pavel Abaev, Rostislav Razumchik, Joanna Kołodziej (Eds.)

Volume 24 (2014): Edizione 2 (June 2014)
Signals and Systems (special section, pp. 233-312), Ryszard Makowski and Jan Zarzycki (Eds.)

Volume 24 (2014): Edizione 1 (March 2014)
Selected Problems of Biomedical Engineering (special section, pp. 7 - 63), Marek Kowal and Józef Korbicz (Eds.)

Volume 23 (2013): Edizione 4 (December 2013)

Volume 23 (2013): Edizione 3 (September 2013)

Volume 23 (2013): Edizione 2 (June 2013)

Volume 23 (2013): Edizione 1 (March 2013)

Volume 22 (2012): Edizione 4 (December 2012)
Hybrid and Ensemble Methods in Machine Learning (special section, pp. 787 - 881), Oscar Cordón and Przemysław Kazienko (Eds.)

Volume 22 (2012): Edizione 3 (September 2012)

Volume 22 (2012): Edizione 2 (June 2012)
Analysis and Control of Spatiotemporal Dynamic Systems (special section, pp. 245 - 326), Dariusz Uciński and Józef Korbicz (Eds.)

Volume 22 (2012): Edizione 1 (March 2012)
Advances in Control and Fault-Tolerant Systems (special issue), Józef Korbicz, Didier Maquin and Didier Theilliol (Eds.)

Volume 21 (2011): Edizione 4 (December 2011)

Volume 21 (2011): Edizione 3 (September 2011)
Ediziones in Advanced Control and Diagnosis (special section, pp. 423 - 486), Vicenç Puig and Marcin Witczak (Eds.)

Volume 21 (2011): Edizione 2 (June 2011)
Efficient Resource Management for Grid-Enabled Applications (special section, pp. 219 - 306), Joanna Kołodziej and Fatos Xhafa (Eds.)

Volume 21 (2011): Edizione 1 (March 2011)
Semantic Knowledge Engineering (special section, pp. 9 - 95), Grzegorz J. Nalepa and Antoni Ligęza (Eds.)

Volume 20 (2010): Edizione 4 (December 2010)

Volume 20 (2010): Edizione 3 (September 2010)

Volume 20 (2010): Edizione 2 (June 2010)

Volume 20 (2010): Edizione 1 (March 2010)
Computational Intelligence in Modern Control Systems (special section, pp. 7 - 84), Józef Korbicz and Dariusz Uciński (Eds.)

Volume 19 (2009): Edizione 4 (December 2009)
Robot Control Theory (special section, pp. 519 - 588), Cezary Zieliński (Ed.)

Volume 19 (2009): Edizione 3 (September 2009)
Verified Methods: Applications in Medicine and Engineering (special issue), Andreas Rauh, Ekaterina Auer, Eberhard P. Hofer and Wolfram Luther (Eds.)

Volume 19 (2009): Edizione 2 (June 2009)

Volume 19 (2009): Edizione 1 (March 2009)

Volume 18 (2008): Edizione 4 (December 2008)
Ediziones in Fault Diagnosis and Fault Tolerant Control (special issue), Józef Korbicz and Dominique Sauter (Eds.)

Volume 18 (2008): Edizione 3 (September 2008)
Selected Problems of Computer Science and Control (special issue), Krzysztof Gałkowski, Eric Rogers and Jan Willems (Eds.)

Volume 18 (2008): Edizione 2 (June 2008)
Selected Topics in Biological Cybernetics (special section, pp. 117 - 170), Andrzej Kasiński and Filip Ponulak (Eds.)

Volume 18 (2008): Edizione 1 (March 2008)
Applied Image Processing (special issue), Anton Kummert and Ewaryst Rafajłowicz (Eds.)

Volume 17 (2007): Edizione 4 (December 2007)

Volume 17 (2007): Edizione 3 (September 2007)
Scientific Computation for Fluid Mechanics and Hyperbolic Systems (special issue), Jan Sokołowski and Eric Sonnendrücker (Eds.)

Volume 17 (2007): Edizione 2 (June 2007)

Volume 17 (2007): Edizione 1 (March 2007)

Dettagli della rivista
Formato
Rivista
eISSN
2083-8492
Pubblicato per la prima volta
05 Apr 2007
Periodo di pubblicazione
4 volte all'anno
Lingue
Inglese

Cerca

Volume 32 (2022): Edizione 1 (March 2022)

Dettagli della rivista
Formato
Rivista
eISSN
2083-8492
Pubblicato per la prima volta
05 Apr 2007
Periodo di pubblicazione
4 volte all'anno
Lingue
Inglese

Cerca

0 Articoli
Accesso libero

Global Stability of Discrete–Time Feedback Nonlinear Systems with Descriptor Positive Linear Parts and Interval State Matrices

Pubblicato online: 31 Mar 2022
Pagine: 5 - 10

Astratto

Abstract

The global stability of discrete-time nonlinear systems with descriptor positive linear parts, positive scalar feedbacks and interval state matrices is addressed. Sufficient conditions for the global stability of this class of nonlinear systems are established. The effectiveness of these conditions is illustrated using numerical examples.

Parole chiave

  • global stability
  • positive systems
  • nonlinear systems
  • discrete-time systems
  • feedback
Accesso libero

Fast and Smooth Trajectory Planning for a Class of Linear Systems Based on Parameter and Constraint Reduction

Pubblicato online: 31 Mar 2022
Pagine: 11 - 21

Astratto

Abstract

Fast and smooth trajectory planning is crucial for modern control systems, e.g., missiles, aircraft, robots and AGVs. However, classical spline based trajectory planning tools introduce redundant constraints and parameters, leading to high costs of computation and complicating fast and smooth execution of trajectory planning tasks. A new tool is proposed that employs truncated power functions to annihilate some constraints and reduce the number of parameters in the optimal model. It enables solving a simplified optimal problem in a shorter time while keeping the trajectory sufficiently smooth. With an engineering background, our case studies show that the proposed method has advantages over other solutions. It is promising in regard to the demanding tasks of trajectory planning.

Parole chiave

  • constraint reduction
  • parameter reduction
  • fast calculation
  • trajectory planning
Accesso libero

Sensor Location for Travel Time Estimation Based on the User Equilibrium Principle: Application of Linear Equations

Pubblicato online: 31 Mar 2022
Pagine: 23 - 33

Astratto

Abstract

Travel time is a fundamental measure in any transportation system. With the development of technology, travel time can be automatically collected by a variety of advanced sensors. However, limited by objective conditions, it is difficult for any sensor system to cover the whole transportation network in real time. In order to estimate the travel time of the whole transportation network, this paper gives a system of linear equations which is constructed by the user equilibrium (UE) principle and observed data. The travel time of a link which is not covered by a sensor can be calculated by using the observed data collected by sensors. In a typical transportation network, the minimum number and location of sensors to estimate the travel time of the whole network are given based on the properties of the solution of a systems of linear equations. The results show that, in a typical network, the number and location of sensors follow a certain law. The results of this study can provide reference for the development of transportation and provide a scientific basis for transportation planning.

Parole chiave

  • travel time estimation
  • sensor location
  • user equilibrium principle
  • linear equations
Accesso libero

Exact and Approximation Algorithms for Sensor Placement Against DDoS Attacks

Pubblicato online: 31 Mar 2022
Pagine: 35 - 49

Astratto

Abstract

In a distributed denial of service (DDoS) attack, the attacker gains control of many network users through a virus. Then the controlled users send many requests to a victim, leading to its resources being depleted. DDoS attacks are hard to defend because of their distributed nature, large scale and various attack techniques. One possible mode of defense is to place sensors in a network that can detect and stop an unwanted request. However, such sensors are expensive, as a result of which there is a natural question as to the minimum number of sensors and their optimal placement required to get the necessary level of safety. Presented below are two mixed integer models for optimal sensor placement against DDoS attacks. Both models lead to a trade-off between the number of deployed sensors and the volume of uncontrolled flow. Since the above placement problems are NP-hard, two efficient heuristics are designed, implemented and compared experimentally with exact mixed integer linear programming solvers.

Parole chiave

  • DDoS
  • sensor placement
  • network safety optimization
  • heuristics
Accesso libero

A Feasible Schedule for Parallel Assembly Tasks in Flexible Manufacturing Systems

Pubblicato online: 31 Mar 2022
Pagine: 51 - 63

Astratto

Abstract

The paper concerns the design of a framework for implementing fault-tolerant control of hybrid assembly systems that connect human operators and fully automated technical systems. The main difficulty in such systems is related to delays that result from objective factors influencing human operators’ work, e.g., fatigue, experience, etc. As the battery assembly system can be considered a firm real-time one, these delays are treated as faults. The presented approach guarantees real-time compensation of delays, and the fully automated part of the system is responsible for this compensation. The paper begins with a detailed description of a battery assembly system in which two cooperating parts can be distinguished: fully automatic and semi-automatic. The latter, nonderministic in nature, is the main focus of this paper. To describe and analyze the states of the battery assembly system, instead of the most commonly used simulation, the classic max-plus algebra with an extension allowing one to express non-deterministic human operators’ work is used. In order to synchronize tasks and schedule (according to the reference schedule) automated and human operators’ tasks, it is proposed to use a wireless IoT platform called KIS.ME. As a result, it allows a reference model of human performance to be defined using fuzzy logic. Having such a model, predictive delays tolerant planning is proposed. The final part of the paper presents the achieved results, which clearly indicate the potential benefits that can be obtained by combining the wireless KIS.ME architecture (allocated in the semi-automatic part of the system) with wired standard production networks.

Parole chiave

  • parallel system
  • synchronization
  • scheduling
  • discrete event system
  • wireless equipment
Accesso libero

Non–Standard Analysis Revisited: An Easy Axiomatic Presentation Oriented Towards Numerical Applications

Pubblicato online: 31 Mar 2022
Pagine: 65 - 80

Astratto

Abstract

Alpha-Theory was introduced in 1995 to provide a simplified version of Robinson’s non-standard analysis which overcomes the technicalities of symbolic logic. The theory has been improved over the years, and recently it has been used also to solve practical problems in a pure numerical way, thanks to the introduction of algorithmic numbers. In this paper, we introduce Alpha-Theory using a novel axiomatic approach oriented towards real-world applications, to avoid the need to master mathematical logic and model theory. To corroborate the strong link of this Alpha-Theory axiomatization and scientific computations, we report numerical illustrative applications never carried out by means of non-standard numbers within a computer, i.e., the computation of the eigenvalues of a non-Archimedean matrix, some computations related to non-Archimedean Markov chains, and the Cholesky factorization of a non-Archimedean matrix. We also highlight the differences between our numerical routines and pure symbolic approaches: as expected, the former scales better when the dimension of the problem increases.

Parole chiave

  • Alpha-Theory
  • non-standard analysis
  • non-Archimedean analysis
  • algorithmic numbers
  • non-Archimedean scientific computing
Accesso libero

A Data Association Model for Analysis of Crowd Structure

Pubblicato online: 31 Mar 2022
Pagine: 81 - 94

Astratto

Abstract

The paper discusses a non-deterministic model for data association tasks in visual surveillance of crowds. Using detection and tracking of crowd components (i.e., individuals and groups) as baseline tools, we propose a simple algebraic framework for maintaining data association (continuity of labels assigned to crowd components) between subsequent video-frames in spite of possible disruptions and inaccuracies in tracking/detection algorithms. Formally, two alternative schemes (which, in practice, can be jointly used) are introduced, depending on whether individuals or groups can be prospectively better tracked in the current scenario. In the first scheme, only individuals are tracked, and the continuity of group labels is inferred without explicitly tracking the groups. In the second scheme, only group tracking is performed, and associations between individuals are inferred from group tracking. The associations are built upon non-deterministic estimates of memberships (individuals in groups) and estimates obtained directly from the baseline detection and tracking algorithms. The framework can incorporate any detectors and trackers (both classical or DL-based) as long as they can provide some geometric outlines (e.g., bounding boxes) of the crowd components. The formal analysis is supported by experiments in exemplary scenarios, where the framework provides meaningful performance improvements in various crowd analysis tasks.

Parole chiave

  • data association
  • visual surveillance
  • crowd analysis
  • algebraic model
Accesso libero

A Comprehensive Study of Clustering a Class of 2D Shapes

Pubblicato online: 31 Mar 2022
Pagine: 95 - 109

Astratto

Abstract

The paper is concerned with clustering with respect to the shape and size of 2D contours that are boundaries of cross-sections of 3D objects of revolution. We propose a number of similarity measures based on combined disparate Procrustes analysis (PA) and dynamic time warping (DTW) distances. A motivation and the main application for this study comes from archaeology. The computational experiments performed refer to the clustering of archaeological pottery.

Parole chiave

  • shape representation
  • Procrustes distance
  • shape similarity
  • DTW
  • morphometrics
  • clustering
  • Kendall shape theory
  • typology of archaeological pottery
Accesso libero

Performance Analysis of a Dual Stage Deep Rain Streak Removal Convolution Neural Network Module with a Modified Deep Residual Dense Network

Pubblicato online: 31 Mar 2022
Pagine: 111 - 123

Astratto

Abstract

The visual appearance of outdoor captured images is affected by various weather conditions, such as rain patterns, haze, fog and snow. The rain pattern creates more degradation in the visual quality of the image due to its physical structure compared with other weather conditions. Also, the rain pattern affects both foreground and background image information. The removal of rain patterns from a single image is a critical process, and more attention is given to remove the structural rain pattern from real-time rain images. In this paper, we analyze the single image deraining problem and present a solution using the dual stage deep rain streak removal convolutional neural network. The proposed single image deraining framework primarily consists of three main blocks: a derain streaks removal CNN (derain SRCNN), a modified residual dense block (MRDB), and a six-stage scale feature aggregation module (3SFAM). The ablation study is conducted to evaluate the performance of various modules available in the proposed deraining network. The robustness of the proposed deraining network is evaluated over the popular synthetic and real-time data sets using four performance metrics such as the peak signal-to-noise ratio (PSNR), the feature similarity index (FSIM), the structural similarity index measure (SSIM), and the universal image quality index (UIQI). The experimental results show that the proposed framework outperforms both synthetic and real-time images compared with other state-of-the-art single image deraining approaches. In addition, the proposed network takes less running and training time.

Parole chiave

  • single image deraining
  • deep learning
  • modified residual dense network
  • PyTorch
Accesso libero

A Multi–Source Fluid Queue Based Stochastic Model of the Probabilistic Offloading Strategy in a MEC System With Multiple Mobile Devices and a Single MEC Server

Pubblicato online: 31 Mar 2022
Pagine: 125 - 138

Astratto

Abstract

Mobile edge computing (MEC) is one of the key technologies to achieve high bandwidth, low latency and reliable service in fifth generation (5G) networks. In order to better evaluate the performance of the probabilistic offloading strategy in a MEC system, we give a modeling method to capture the stochastic behavior of tasks based on a multi-source fluid queue. Considering multiple mobile devices (MDs) in a MEC system, we build a multi-source fluid queue to model the tasks offloaded to the MEC server. We give an approach to analyze the fluid queue driven by multiple independent heterogeneous finite-state birth-and-death processes (BDPs) and present the cumulative distribution function (CDF) of the edge buffer content. Then, we evaluate the performance measures in terms of the utilization of the MEC server, the expected edge buffer content and the average response time of a task. Finally, we provide numerical results with some analysis to illustrate the feasibility of the stochastic model built in this paper.

Parole chiave

  • mobile edge computing
  • probabilistic offloading strategy
  • multi-source fluid queue
  • birth-and-death process
  • cumulative distribution function
Accesso libero

Hybrid Cryptography with a One–Time Stamp to Secure Contact Tracing for COVID–19 Infection

Pubblicato online: 31 Mar 2022
Pagine: 139 - 146

Astratto

Abstract

The COVID-19 pandemic changed the lives of millions of citizens worldwide in the manner they live and work to the so-called new norm in social standards. In addition to the extraordinary effects on society, the pandemic created a range of unique circumstances associated with cybercrime that also affected society and business. The anxiety due to the pandemic increased the probability of successful cyberattacks and as well as their number and range. For public health officials and communities, location tracking is an essential component in the efforts to combat the disease. The governments provide a lot of mobile apps to help health officials to trace the infected persons and contact them to aid and follow up on the health status, which requires an exchange of data in different forms. This paper presents the one-time stamp model as a new cryptography technique to secure different contact forms and protect the privacy of the infected person. The one-time stamp hybrid model consists of a combination of symmetric, asymmetric, and hashing cryptography in an entirely new way that is different from conventional and similar existing algorithms. Several experiments have been carried out to analyze and examine the proposed technique. Also, a comparison study has been made between our proposed technique and other state-of-the-art alternatives. Results show that the proposed one-time stamp model provides a high level of security for the encryption of sensitive data relative to other similar techniques with no extra computational cost besides faster processing time.

Parole chiave

  • hybrid cryptography
  • digital signature
  • hash
  • RSA
  • AES
  • asymmetric cryptography
  • symmetric cryptography
  • cybersecurity
  • COVID-19
Accesso libero

Template Chart Detection for Stoma Telediagnosis

Pubblicato online: 31 Mar 2022
Pagine: 147 - 160

Astratto

Abstract

The paper presents the concept of using color template charts for the needs of telemedicine, particularly telediagnosis of the stoma. Although the concept is not new, the current popularity and level of development of digital cameras, especially those embedded in smartphones, allow common and reliable remote advice on various medical problems, which can be very important in the case of limitations in a physical contact with a doctor. The article focuses on the initial stages of photo processing for the needs of telemedicine, i.e., on the assumptions and the process of designing the appropriate template and detecting it in photos for stoma telediagnosis. Research on the developed algorithms for the location of fiducial markers and reference color fields, carried out on the basis of over 2,000 photos, showed a very high tolerance to scene exposure, lighting conditions and the camera used. The obtained results allowed the initial image intensity normalization of the stoma area as well as correct localization and measurement of changes detected on the skin and the mucosa, which, in the opinion of doctors, significantly increased the diagnostic value of the photographs.

Parole chiave

  • stoma
  • marker detection
  • telediagnosis
  • distortion correction
0 Articoli
Accesso libero

Global Stability of Discrete–Time Feedback Nonlinear Systems with Descriptor Positive Linear Parts and Interval State Matrices

Pubblicato online: 31 Mar 2022
Pagine: 5 - 10

Astratto

Abstract

The global stability of discrete-time nonlinear systems with descriptor positive linear parts, positive scalar feedbacks and interval state matrices is addressed. Sufficient conditions for the global stability of this class of nonlinear systems are established. The effectiveness of these conditions is illustrated using numerical examples.

Parole chiave

  • global stability
  • positive systems
  • nonlinear systems
  • discrete-time systems
  • feedback
Accesso libero

Fast and Smooth Trajectory Planning for a Class of Linear Systems Based on Parameter and Constraint Reduction

Pubblicato online: 31 Mar 2022
Pagine: 11 - 21

Astratto

Abstract

Fast and smooth trajectory planning is crucial for modern control systems, e.g., missiles, aircraft, robots and AGVs. However, classical spline based trajectory planning tools introduce redundant constraints and parameters, leading to high costs of computation and complicating fast and smooth execution of trajectory planning tasks. A new tool is proposed that employs truncated power functions to annihilate some constraints and reduce the number of parameters in the optimal model. It enables solving a simplified optimal problem in a shorter time while keeping the trajectory sufficiently smooth. With an engineering background, our case studies show that the proposed method has advantages over other solutions. It is promising in regard to the demanding tasks of trajectory planning.

Parole chiave

  • constraint reduction
  • parameter reduction
  • fast calculation
  • trajectory planning
Accesso libero

Sensor Location for Travel Time Estimation Based on the User Equilibrium Principle: Application of Linear Equations

Pubblicato online: 31 Mar 2022
Pagine: 23 - 33

Astratto

Abstract

Travel time is a fundamental measure in any transportation system. With the development of technology, travel time can be automatically collected by a variety of advanced sensors. However, limited by objective conditions, it is difficult for any sensor system to cover the whole transportation network in real time. In order to estimate the travel time of the whole transportation network, this paper gives a system of linear equations which is constructed by the user equilibrium (UE) principle and observed data. The travel time of a link which is not covered by a sensor can be calculated by using the observed data collected by sensors. In a typical transportation network, the minimum number and location of sensors to estimate the travel time of the whole network are given based on the properties of the solution of a systems of linear equations. The results show that, in a typical network, the number and location of sensors follow a certain law. The results of this study can provide reference for the development of transportation and provide a scientific basis for transportation planning.

Parole chiave

  • travel time estimation
  • sensor location
  • user equilibrium principle
  • linear equations
Accesso libero

Exact and Approximation Algorithms for Sensor Placement Against DDoS Attacks

Pubblicato online: 31 Mar 2022
Pagine: 35 - 49

Astratto

Abstract

In a distributed denial of service (DDoS) attack, the attacker gains control of many network users through a virus. Then the controlled users send many requests to a victim, leading to its resources being depleted. DDoS attacks are hard to defend because of their distributed nature, large scale and various attack techniques. One possible mode of defense is to place sensors in a network that can detect and stop an unwanted request. However, such sensors are expensive, as a result of which there is a natural question as to the minimum number of sensors and their optimal placement required to get the necessary level of safety. Presented below are two mixed integer models for optimal sensor placement against DDoS attacks. Both models lead to a trade-off between the number of deployed sensors and the volume of uncontrolled flow. Since the above placement problems are NP-hard, two efficient heuristics are designed, implemented and compared experimentally with exact mixed integer linear programming solvers.

Parole chiave

  • DDoS
  • sensor placement
  • network safety optimization
  • heuristics
Accesso libero

A Feasible Schedule for Parallel Assembly Tasks in Flexible Manufacturing Systems

Pubblicato online: 31 Mar 2022
Pagine: 51 - 63

Astratto

Abstract

The paper concerns the design of a framework for implementing fault-tolerant control of hybrid assembly systems that connect human operators and fully automated technical systems. The main difficulty in such systems is related to delays that result from objective factors influencing human operators’ work, e.g., fatigue, experience, etc. As the battery assembly system can be considered a firm real-time one, these delays are treated as faults. The presented approach guarantees real-time compensation of delays, and the fully automated part of the system is responsible for this compensation. The paper begins with a detailed description of a battery assembly system in which two cooperating parts can be distinguished: fully automatic and semi-automatic. The latter, nonderministic in nature, is the main focus of this paper. To describe and analyze the states of the battery assembly system, instead of the most commonly used simulation, the classic max-plus algebra with an extension allowing one to express non-deterministic human operators’ work is used. In order to synchronize tasks and schedule (according to the reference schedule) automated and human operators’ tasks, it is proposed to use a wireless IoT platform called KIS.ME. As a result, it allows a reference model of human performance to be defined using fuzzy logic. Having such a model, predictive delays tolerant planning is proposed. The final part of the paper presents the achieved results, which clearly indicate the potential benefits that can be obtained by combining the wireless KIS.ME architecture (allocated in the semi-automatic part of the system) with wired standard production networks.

Parole chiave

  • parallel system
  • synchronization
  • scheduling
  • discrete event system
  • wireless equipment
Accesso libero

Non–Standard Analysis Revisited: An Easy Axiomatic Presentation Oriented Towards Numerical Applications

Pubblicato online: 31 Mar 2022
Pagine: 65 - 80

Astratto

Abstract

Alpha-Theory was introduced in 1995 to provide a simplified version of Robinson’s non-standard analysis which overcomes the technicalities of symbolic logic. The theory has been improved over the years, and recently it has been used also to solve practical problems in a pure numerical way, thanks to the introduction of algorithmic numbers. In this paper, we introduce Alpha-Theory using a novel axiomatic approach oriented towards real-world applications, to avoid the need to master mathematical logic and model theory. To corroborate the strong link of this Alpha-Theory axiomatization and scientific computations, we report numerical illustrative applications never carried out by means of non-standard numbers within a computer, i.e., the computation of the eigenvalues of a non-Archimedean matrix, some computations related to non-Archimedean Markov chains, and the Cholesky factorization of a non-Archimedean matrix. We also highlight the differences between our numerical routines and pure symbolic approaches: as expected, the former scales better when the dimension of the problem increases.

Parole chiave

  • Alpha-Theory
  • non-standard analysis
  • non-Archimedean analysis
  • algorithmic numbers
  • non-Archimedean scientific computing
Accesso libero

A Data Association Model for Analysis of Crowd Structure

Pubblicato online: 31 Mar 2022
Pagine: 81 - 94

Astratto

Abstract

The paper discusses a non-deterministic model for data association tasks in visual surveillance of crowds. Using detection and tracking of crowd components (i.e., individuals and groups) as baseline tools, we propose a simple algebraic framework for maintaining data association (continuity of labels assigned to crowd components) between subsequent video-frames in spite of possible disruptions and inaccuracies in tracking/detection algorithms. Formally, two alternative schemes (which, in practice, can be jointly used) are introduced, depending on whether individuals or groups can be prospectively better tracked in the current scenario. In the first scheme, only individuals are tracked, and the continuity of group labels is inferred without explicitly tracking the groups. In the second scheme, only group tracking is performed, and associations between individuals are inferred from group tracking. The associations are built upon non-deterministic estimates of memberships (individuals in groups) and estimates obtained directly from the baseline detection and tracking algorithms. The framework can incorporate any detectors and trackers (both classical or DL-based) as long as they can provide some geometric outlines (e.g., bounding boxes) of the crowd components. The formal analysis is supported by experiments in exemplary scenarios, where the framework provides meaningful performance improvements in various crowd analysis tasks.

Parole chiave

  • data association
  • visual surveillance
  • crowd analysis
  • algebraic model
Accesso libero

A Comprehensive Study of Clustering a Class of 2D Shapes

Pubblicato online: 31 Mar 2022
Pagine: 95 - 109

Astratto

Abstract

The paper is concerned with clustering with respect to the shape and size of 2D contours that are boundaries of cross-sections of 3D objects of revolution. We propose a number of similarity measures based on combined disparate Procrustes analysis (PA) and dynamic time warping (DTW) distances. A motivation and the main application for this study comes from archaeology. The computational experiments performed refer to the clustering of archaeological pottery.

Parole chiave

  • shape representation
  • Procrustes distance
  • shape similarity
  • DTW
  • morphometrics
  • clustering
  • Kendall shape theory
  • typology of archaeological pottery
Accesso libero

Performance Analysis of a Dual Stage Deep Rain Streak Removal Convolution Neural Network Module with a Modified Deep Residual Dense Network

Pubblicato online: 31 Mar 2022
Pagine: 111 - 123

Astratto

Abstract

The visual appearance of outdoor captured images is affected by various weather conditions, such as rain patterns, haze, fog and snow. The rain pattern creates more degradation in the visual quality of the image due to its physical structure compared with other weather conditions. Also, the rain pattern affects both foreground and background image information. The removal of rain patterns from a single image is a critical process, and more attention is given to remove the structural rain pattern from real-time rain images. In this paper, we analyze the single image deraining problem and present a solution using the dual stage deep rain streak removal convolutional neural network. The proposed single image deraining framework primarily consists of three main blocks: a derain streaks removal CNN (derain SRCNN), a modified residual dense block (MRDB), and a six-stage scale feature aggregation module (3SFAM). The ablation study is conducted to evaluate the performance of various modules available in the proposed deraining network. The robustness of the proposed deraining network is evaluated over the popular synthetic and real-time data sets using four performance metrics such as the peak signal-to-noise ratio (PSNR), the feature similarity index (FSIM), the structural similarity index measure (SSIM), and the universal image quality index (UIQI). The experimental results show that the proposed framework outperforms both synthetic and real-time images compared with other state-of-the-art single image deraining approaches. In addition, the proposed network takes less running and training time.

Parole chiave

  • single image deraining
  • deep learning
  • modified residual dense network
  • PyTorch
Accesso libero

A Multi–Source Fluid Queue Based Stochastic Model of the Probabilistic Offloading Strategy in a MEC System With Multiple Mobile Devices and a Single MEC Server

Pubblicato online: 31 Mar 2022
Pagine: 125 - 138

Astratto

Abstract

Mobile edge computing (MEC) is one of the key technologies to achieve high bandwidth, low latency and reliable service in fifth generation (5G) networks. In order to better evaluate the performance of the probabilistic offloading strategy in a MEC system, we give a modeling method to capture the stochastic behavior of tasks based on a multi-source fluid queue. Considering multiple mobile devices (MDs) in a MEC system, we build a multi-source fluid queue to model the tasks offloaded to the MEC server. We give an approach to analyze the fluid queue driven by multiple independent heterogeneous finite-state birth-and-death processes (BDPs) and present the cumulative distribution function (CDF) of the edge buffer content. Then, we evaluate the performance measures in terms of the utilization of the MEC server, the expected edge buffer content and the average response time of a task. Finally, we provide numerical results with some analysis to illustrate the feasibility of the stochastic model built in this paper.

Parole chiave

  • mobile edge computing
  • probabilistic offloading strategy
  • multi-source fluid queue
  • birth-and-death process
  • cumulative distribution function
Accesso libero

Hybrid Cryptography with a One–Time Stamp to Secure Contact Tracing for COVID–19 Infection

Pubblicato online: 31 Mar 2022
Pagine: 139 - 146

Astratto

Abstract

The COVID-19 pandemic changed the lives of millions of citizens worldwide in the manner they live and work to the so-called new norm in social standards. In addition to the extraordinary effects on society, the pandemic created a range of unique circumstances associated with cybercrime that also affected society and business. The anxiety due to the pandemic increased the probability of successful cyberattacks and as well as their number and range. For public health officials and communities, location tracking is an essential component in the efforts to combat the disease. The governments provide a lot of mobile apps to help health officials to trace the infected persons and contact them to aid and follow up on the health status, which requires an exchange of data in different forms. This paper presents the one-time stamp model as a new cryptography technique to secure different contact forms and protect the privacy of the infected person. The one-time stamp hybrid model consists of a combination of symmetric, asymmetric, and hashing cryptography in an entirely new way that is different from conventional and similar existing algorithms. Several experiments have been carried out to analyze and examine the proposed technique. Also, a comparison study has been made between our proposed technique and other state-of-the-art alternatives. Results show that the proposed one-time stamp model provides a high level of security for the encryption of sensitive data relative to other similar techniques with no extra computational cost besides faster processing time.

Parole chiave

  • hybrid cryptography
  • digital signature
  • hash
  • RSA
  • AES
  • asymmetric cryptography
  • symmetric cryptography
  • cybersecurity
  • COVID-19
Accesso libero

Template Chart Detection for Stoma Telediagnosis

Pubblicato online: 31 Mar 2022
Pagine: 147 - 160

Astratto

Abstract

The paper presents the concept of using color template charts for the needs of telemedicine, particularly telediagnosis of the stoma. Although the concept is not new, the current popularity and level of development of digital cameras, especially those embedded in smartphones, allow common and reliable remote advice on various medical problems, which can be very important in the case of limitations in a physical contact with a doctor. The article focuses on the initial stages of photo processing for the needs of telemedicine, i.e., on the assumptions and the process of designing the appropriate template and detecting it in photos for stoma telediagnosis. Research on the developed algorithms for the location of fiducial markers and reference color fields, carried out on the basis of over 2,000 photos, showed a very high tolerance to scene exposure, lighting conditions and the camera used. The obtained results allowed the initial image intensity normalization of the stoma area as well as correct localization and measurement of changes detected on the skin and the mucosa, which, in the opinion of doctors, significantly increased the diagnostic value of the photographs.

Parole chiave

  • stoma
  • marker detection
  • telediagnosis
  • distortion correction