Nothing Special   »   [go: up one dir, main page]

Next Issue
Volume 16, March
Previous Issue
Volume 16, January
You seem to have javascript disabled. Please note that many of the page functionalities won't work as expected without javascript enabled.
 
 

Algorithms, Volume 16, Issue 2 (February 2023) – 64 articles

Cover Story (view full-size image): We explored the ability of a deep learning algorithm to segment ancient Egyptian hieroglyphs present in an image. The issue is complex, the main obstacles being the high number of different classes of existing hieroglyphs and the differences related to the hand of the scribe, as well as the great differences among the various supports, such as papyri, stone or wood, where they are written. Furthermore, deterioration to the supports occurs frequently in all archaeological findings, which has the effect of partially corrupting the hieroglyphs. We leveraged the well-known Detectron2 platform to tackle this difficult challenge, focusing on the Mask R-CNN architecture to carry out image instance segmentation. The results show good achievements as well as the current limitations of our study. View this paper
  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list.
  • You may sign up for e-mail alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.
Order results
Result details
Section
Select all
Export citation of selected articles as:
18 pages, 7764 KiB  
Article
Fourier Neural Operator Network for Fast Photoacoustic Wave Simulations
by Steven Guan, Ko-Tsung Hsu and Parag V. Chitnis
Algorithms 2023, 16(2), 124; https://doi.org/10.3390/a16020124 - 19 Feb 2023
Cited by 7 | Viewed by 3681
Abstract
Simulation tools for photoacoustic wave propagation have played a key role in advancing photoacoustic imaging by providing quantitative and qualitative insights into parameters affecting image quality. Classical methods for numerically solving the photoacoustic wave equation rely on a fine discretization of space and [...] Read more.
Simulation tools for photoacoustic wave propagation have played a key role in advancing photoacoustic imaging by providing quantitative and qualitative insights into parameters affecting image quality. Classical methods for numerically solving the photoacoustic wave equation rely on a fine discretization of space and can become computationally expensive for large computational grids. In this work, we applied Fourier Neural Operator (FNO) networks as a fast data-driven deep learning method for solving the 2D photoacoustic wave equation in a homogeneous medium. Comparisons between the FNO network and pseudo-spectral time domain approach were made for the forward and adjoint simulations. Results demonstrate that the FNO network generated comparable simulations with small errors and was orders of magnitude faster than the pseudo-spectral time domain methods (~26× faster on a 64 × 64 computational grid and ~15× faster on a 128 × 128 computational grid). Moreover, the FNO network was generalizable to the unseen out-of-domain test set with a root-mean-square error of 9.5 × 10−3 in Shepp–Logan, 1.5 × 10−2 in synthetic vasculature, 1.1 × 10−2 in tumor and 1.9 × 10−2 in Mason-M phantoms on a 64 × 64 computational grid and a root mean squared of 6.9 ± 5.5 × 10−3 in the AWA2 dataset on a 128 × 128 computational grid. Full article
(This article belongs to the Special Issue Deep Learning Architecture and Applications)
Show Figures

Figure 1

Figure 1
<p>Diagram illustrating the process of photoacoustic signal generation and detection. Chromophores absorb the incident pulsed laser light and undergo thermoelastic expansion to generate acoustic waves. Acoustic detectors along the measurement boundary So are used to measure the acoustic waves.</p>
Full article ">Figure 2
<p>Neural network architecture for the FNO network. The input a (initial pressure distribution a) is mapped to a higher dimensional space using a fully connected layer (<span class="html-italic">FC</span><sub>0</sub>). The transformed feature is passed through four Fourier Layers (FLs). Finally, a fully connected layer (<span class="html-italic">FC</span><sub>2</sub>) is used to obtain the final output u (solution to the wave equation u) with the desired dimensions. The input goes through two paths in each Fourier layer. In the top path, the input undergoes a Fourier Transform FFT, linear transform R and inverse Fourier Transform iFFT. In the bottom path, the input undergoes a linear transform. Outputs from each path are summed together and undergo GeLU activation. The dimension of the feature representation for each operation is given in the parentheses.</p>
Full article ">Figure 3
<p>Visual comparison of the ground truth (<b>Top</b> Row) using k-Wave and the FNO network (<b>Bottom</b> Row) simulated photoacoustic wave propagation for an example vasculature image in a homogeneous medium at t = [1, 20, 40, 60, 80] time steps. The RMSE over all time steps was 3.8 × 10<sup>−3</sup> for this example.</p>
Full article ">Figure 4
<p>RMSE and standard deviation bands between the k-Wave and FNO simulations on the breast vasculature test dataset. Distribution of pressures (25th, 50th and 75th percentiles) are provided as a frame of reference.</p>
Full article ">Figure 5
<p>FNO and k-Wave were used to simulate wave propagation for the ground truth image. Sensor data were sampled from the resulting simulations and reconstructed into PAT images. The k-Wave and FNO images are almost identical. RMSE (0.011), SSIM (0.97) and max error (0.06).</p>
Full article ">Figure 6
<p>Comparison between FNO Network and k-Wave simulations for initial pressure sources using the (<b>a</b>) Shepp–Logan, (<b>b</b>) synthetic vasculature, (<b>c</b>) tumor and (<b>d</b>) Mason-M phantoms at t = [1, 10, 20] time steps.</p>
Full article ">Figure 7
<p>Comparison of FNO simulations at t = 1, 5, 10, 15 and 20 time steps. (<b>a</b>) k-Wave simulation. (<b>b</b>) The FNO network were parametrized with channels = 5 and modes = 16. (<b>c</b>) The FNO network were parametrized with channels = 5 and modes = 32. (<b>d</b>) The FNO network were parametrized with channels = 5 and modes = 64.</p>
Full article ">Figure 8
<p>Simulations shown are for a 128 × 128 computation grid. (<b>Top</b>) Comparison between FNO and k-Wave forward simulations at t = [1, 40, 80, 120, 160] time steps. (<b>Bottom</b>) Comparison between FNO and k-Wave adjoint simulation t = [200, 220, 240, 260, 280] time steps. The input to both adjoint simulations was sensor data sampled with a linear array from the k-Wave forward simulation.</p>
Full article ">Figure 9
<p>RMSE and standard deviation bands between the k-Wave and FNO forward simulations on the AWA2 test dataset. Distribution of pressures (25th, 50th and 75th percentiles) are provided as a frame of reference.</p>
Full article ">Figure 10
<p>RMSE and standard deviation bands between the k-Wave and FNO adjoint simulations for the AWA2 test dataset. Distribution of pressures (25th, 50th and 75th percentiles) is provided as a frame of reference.</p>
Full article ">Figure 11
<p>Zero-shot super resolution using an FNO trained on a 128 × 128 × 302 computational grid to perform simulations on a 224 × 224 × 302 grid. Images from the FNO and k-Wave simulations at t = 5 and zoomed regions are shown. (<b>Left</b>) Animal image of a lion from the testing dataset. (<b>Right</b>) Vasculature image to evaluate FNO generalizability.</p>
Full article ">
20 pages, 3886 KiB  
Article
IRONEDGE: Stream Processing Architecture for Edge Applications
by João Pedro Vitorino, José Simão, Nuno Datia and Matilde Pato
Algorithms 2023, 16(2), 123; https://doi.org/10.3390/a16020123 - 17 Feb 2023
Viewed by 1906
Abstract
This paper presents IRONEDGE, an architectural framework that can be used in different edge Stream Processing solutions for “Smart Infrastructure” scenarios, on a case-by-case basis. The architectural framework identifies the common components that any such solution should implement and a generic processing pipeline. [...] Read more.
This paper presents IRONEDGE, an architectural framework that can be used in different edge Stream Processing solutions for “Smart Infrastructure” scenarios, on a case-by-case basis. The architectural framework identifies the common components that any such solution should implement and a generic processing pipeline. In particular, the framework is considered in the context of a study case regarding Internet of Things (IoT) devices to be attached to rolling stock in a railway. A lack of computation and storage resources available in edge devices and infrequent network connectivity are not often seen in the existing literature, but were considered in this paper. Two distinct implementations of IRONEDGE were considered and tested. One, identified as Apache Kafka with Kafka Connect (K0-WC), uses Kafka Connect to pass messages from MQ Telemetry Transport (MQTT) to Apache Kafka. The second scenario, identified as Apache Kafka with No Kafka Connect (K1-NC), allows Apache Storm to consume messages directly. When the data rate increased, K0-WC showed low throughput resulting from high losses, whereas K1-NC displayed an increase in throughput, but did not match the input rate for the Data Reports. The results showed that the framework can be used for defining new solutions for edge Stream Processing scenarios and identified a reference implementation for the considered study case. In future work, the authors propose to extend the evaluation of the architectural variation of K1-NC. Full article
Show Figures

Figure 1

Figure 1
<p>Three-layer architecture for edge-computing-based solutions. Adapted from [<a href="#B11-algorithms-16-00123" class="html-bibr">11</a>].</p>
Full article ">Figure 2
<p>High-level overview of the proposed framework, identifying the fundamental set of components: Data Collection, Stream Processing, Local Storage, Event Output.</p>
Full article ">Figure 3
<p>Processing pipeline for approximation of workloads. Including connections with Local Storage and external components.</p>
Full article ">Figure 4
<p>High-level view of sensor integration for Ferrovia 4.0.</p>
Full article ">Figure 5
<p>Implementation of the Ferrovia 4.0 architectures. (<b>a</b>) K0-WC uses Kafka Connect to integrate the MQTT source. (<b>b</b>) No Kafka Connect is used by K1-NC, instead consuming the MQTT source directly. Kubernetes implicitly uses Grafana [<a href="#B41-algorithms-16-00123" class="html-bibr">41</a>] and Prometheus [<a href="#B42-algorithms-16-00123" class="html-bibr">42</a>] for resource monitoring.</p>
Full article ">Figure 6
<p>Resource usage for each implementation and Data Reports’ rate. (<b>a</b>) Average memory utilization. (<b>b</b>) Average CPU utilization.</p>
Full article ">Figure 7
<p>Implementation performance measured as loss rates and latency, for each implementation and Data Reports’ rate. (<b>a</b>) Loss rates. (<b>b</b>) Average end-to-end latency.</p>
Full article ">Figure 8
<p>Implementation performance measured as throughput and log time, for each implementation and Data Reports’ rate. (<b>a</b>) Actual throughput. (<b>b</b>) Log time.</p>
Full article ">
30 pages, 11833 KiB  
Article
Integral Backstepping Control Algorithm for a Quadrotor Positioning Flight Task: A Design Issue Discussion
by Yang-Rui Li, Chih-Chia Chen and Chao-Chung Peng
Algorithms 2023, 16(2), 122; https://doi.org/10.3390/a16020122 - 16 Feb 2023
Cited by 4 | Viewed by 2675
Abstract
For quadrotor control applications, it is necessary to rely on attitude angle changes to indirectly achieve the position trajectory tracking purpose. Several existing literature studies omit the non-negligible attitude transients in the position controller design for this kind of cascade system. The result [...] Read more.
For quadrotor control applications, it is necessary to rely on attitude angle changes to indirectly achieve the position trajectory tracking purpose. Several existing literature studies omit the non-negligible attitude transients in the position controller design for this kind of cascade system. The result leads to the position tracking performance not being as good as expected. In fact, the transient behavior of the attitude tracking response cannot be ignored. Therefore, the closed-loop stability of the attitude loop as well as the position tracking should be considered simultaneously. In this study, the flight controller design of the position and attitude control loops is presented based on an integral backstepping control algorithm. This control algorithm relies on the derivatives of the associated virtual control laws for implementation. Examining existing literature, the derivatives of the virtual control law are realized approximated by numerical differentiations. Nevertheless, in practical scenarios, the numerical differentiations will cause the chattering phenomenon of control signals in the presence of unavoidable measurement noise. The noise-induced control signals may further cause damage to the actuators or even diverge the system response. To address this issue, the analytic form for the derivative of the virtual control law is derived. The time derivative virtual control law is analyzed and split into the disturbance-independent compensable and disturbance-dependent non-compensable terms. By utilizing the compensable term, the control chattering due to the differentiation of the noise can be avoided significantly. The simulation results reveal that the proposed control algorithm has a better position tracking performance than the traditional dual-loop control scheme. Meanwhile, a relatively smooth control signal can be obtained for a realistic control algorithm realization. Simulations are provided to illustrate the position tracking issue of a quadrotor and to demonstrate the effectiveness of the proposed compromised control scheme. Full article
(This article belongs to the Collection Feature Paper in Algorithms and Complexity Theory)
Show Figures

Figure 1

Figure 1
<p>The dynamic configuration of the 3-DoF quadrotor system.</p>
Full article ">Figure 2
<p>Desired output <math display="inline"><semantics> <msub> <mi>x</mi> <mi>d</mi> </msub> </semantics></math> to its fourth differentiation.</p>
Full article ">Figure 3
<p>Evolution of external disturbances. (<b>a</b>) the time-varying disturbances; (<b>b</b>) the state-dependent viscous drags.</p>
Full article ">Figure 4
<p>Comparison of measured and actual states for different approaches. (<b>a</b>) CPID; (<b>b</b>) IBC; (<b>c</b>) AIBC.</p>
Full article ">Figure 5
<p>Comparison of the desired command and system response in the <span class="html-italic">x</span>-direction for different approaches. (<b>a</b>) desired command and actual states; (<b>b</b>) tracking errors.</p>
Full article ">Figure 6
<p>Comparison of the desired command and system response in the <span class="html-italic">z</span>-direction for different approaches. (<b>a</b>) desired command and actual states; (<b>b</b>) tracking errors.</p>
Full article ">Figure 7
<p>Comparison of computed and truly allowed controls and rotor speeds for the CPID. (<b>a</b>) comparison of the computed and truly allowed controls (CPID); (<b>b</b>) square of computed rotor speeds; (<b>c</b>) truly allowed rotor speeds.</p>
Full article ">Figure 8
<p>Comparison of computed and truly allowed controls and rotor speeds for the IBC. (<b>a</b>) comparison of the computed and truly allowed controls (IBC); (<b>b</b>) square of computed rotor speeds; (<b>c</b>) truly allowed rotor speeds.</p>
Full article ">Figure 9
<p>Comparison of computed and truly allowed controls and rotor speeds for the proposed AIBC. (<b>a</b>) comparison of the computed and truly allowed controls (AIBC); (<b>b</b>) square of computed rotor speeds; (<b>c</b>) truly allowed rotor speeds.</p>
Full article ">Figure 10
<p>Comparison of computed control force and torque for different approaches. (<b>a</b>) computed control force; (<b>b</b>) computed control torque.</p>
Full article ">Figure 11
<p>Virtual controls of the IBC and AIBC.</p>
Full article ">
21 pages, 6631 KiB  
Article
Interpretation for Variational Autoencoder Used to Generate Financial Synthetic Tabular Data
by Jinhong Wu, Konstantinos Plataniotis, Lucy Liu, Ehsan Amjadian and Yuri Lawryshyn
Algorithms 2023, 16(2), 121; https://doi.org/10.3390/a16020121 - 16 Feb 2023
Cited by 6 | Viewed by 4463
Abstract
Synthetic data, artificially generated by computer programs, has become more widely used in the financial domain to mitigate privacy concerns. Variational Autoencoder (VAE) is one of the most popular deep-learning models for generating synthetic data. However, VAE is often considered a “black box” [...] Read more.
Synthetic data, artificially generated by computer programs, has become more widely used in the financial domain to mitigate privacy concerns. Variational Autoencoder (VAE) is one of the most popular deep-learning models for generating synthetic data. However, VAE is often considered a “black box” due to its opaqueness. Although some studies have been conducted to provide explanatory insights into VAE, research focusing on explaining how the input data could influence VAE to create synthetic data, especially for tabular data, is still lacking. However, in the financial industry, most data are stored in a tabular format. This paper proposes a sensitivity-based method to assess the impact of inputted tabular data on how VAE synthesizes data. This sensitivity-based method can provide both global and local interpretations efficiently and intuitively. To test this method, a simulated dataset and three Kaggle banking tabular datasets were employed. The results confirmed the applicability of this proposed method. Full article
(This article belongs to the Special Issue Interpretability, Accountability and Robustness in Machine Learning)
Show Figures

Figure 1

Figure 1
<p>Architecture of the Variational Autoencoder (VAE).</p>
Full article ">Figure 2
<p>Flow chart of applying sensitivity analysis to interpret VAE.</p>
Full article ">Figure 3
<p>Distribution of dataset 1.</p>
Full article ">Figure 4
<p>Distribution of dataset 2.</p>
Full article ">Figure 5
<p>Distribution of dataset 3.</p>
Full article ">Figure 6
<p>Sensitivity values for simulated data.</p>
Full article ">Figure 7
<p>Relative feature importance for simulated data.</p>
Full article ">Figure 8
<p>Feature interaction for simulated data.</p>
Full article ">Figure 9
<p>Local feature importance values for dataset 1.</p>
Full article ">Figure 10
<p>Global feature importance values for dataset 1.</p>
Full article ">Figure 11
<p>Local feature importance values for dataset 2.</p>
Full article ">Figure 12
<p>Global feature importance values for dataset 2.</p>
Full article ">Figure 13
<p>Local feature importance values for dataset 3.</p>
Full article ">Figure 14
<p>Global feature importance values for dataset 3.</p>
Full article ">Figure 15
<p>Local feature interaction values for dataset 1.</p>
Full article ">Figure 16
<p>Global feature interaction values for dataset 1.</p>
Full article ">Figure 17
<p>Local feature interaction values for dataset 2.</p>
Full article ">Figure 18
<p>Global feature interaction values for dataset 2.</p>
Full article ">Figure 19
<p>Local feature interaction values for dataset 3.</p>
Full article ">Figure 20
<p>Global feature interaction values for dataset 3.</p>
Full article ">
17 pages, 9172 KiB  
Article
Rapid Prototyping of H∞ Algorithm for Real-Time Displacement Volume Control of Axial Piston Pumps
by Alexander Mitov, Tsonyo Slavov and Jordan Kralev
Algorithms 2023, 16(2), 120; https://doi.org/10.3390/a16020120 - 15 Feb 2023
Cited by 5 | Viewed by 2445
Abstract
A system for the rapid prototyping of real-time control algorithms for open-circuit variable displacement axial-piston pumps is presented. In order to establish real-time control, and communication and synchronization with the programmable logic controller of an axial piston pump, the custom CAN communication protocol [...] Read more.
A system for the rapid prototyping of real-time control algorithms for open-circuit variable displacement axial-piston pumps is presented. In order to establish real-time control, and communication and synchronization with the programmable logic controller of an axial piston pump, the custom CAN communication protocol is developed. This protocol is realized as a Simulink® S-function, which is a part of main Simulink® model. This model works in real-time and allows for the implementation of rapid prototyping of various control strategies including advanced algorithms such as H∞ control. The aim of the algorithm is to achieve control system performance in the presence of various load disturbances with an admissible control signal rate and amplitude. In contrast to conventional systems, the developed solution suggests using an embedded approach for the prototyping of various algorithms. The obtained results show the advantages of the designed H∞ controller that ensure the robustness of a closed-loop system in the presence of significant load disturbances. These type of systems with displacement volume regulation are important for industrial hydraulic drive systems with relatively high power. Full article
(This article belongs to the Collection Feature Papers in Algorithms)
Show Figures

Figure 1

Figure 1
<p>System for rapid prototyping of control algorithms for axial piston pumps.</p>
Full article ">Figure 2
<p>Photo of the implemented system.</p>
Full article ">Figure 3
<p>Structure scheme of open-loop identification experiment.</p>
Full article ">Figure 4
<p>Pump flow rate, pressure, and control signal used for identification experiment.</p>
Full article ">Figure 5
<p>Comparison between the model simulated output and the identification data set.</p>
Full article ">Figure 6
<p>Structure scheme of extended plant used for <span class="html-italic">H∞</span> controller design.</p>
Full article ">Figure 7
<p>Source code for <span class="html-italic">H∞</span> controller design.</p>
Full article ">Figure 8
<p>Output sensitivity.</p>
Full article ">Figure 9
<p>Complementary sensitivity.</p>
Full article ">Figure 10
<p>Control signal sensitivity.</p>
Full article ">Figure 11
<p>Structure of closed-loop system with <span class="html-italic">H∞</span> controller.</p>
Full article ">Figure 12
<p>Structure of closed-loop system with <span class="html-italic">H∞</span> controller.</p>
Full article ">Figure 13
<p>(<b>a</b>) Simulink implementation of the host controller. (<b>b</b>) Simulink implementation of the host controller.</p>
Full article ">Figure 14
<p>Experimental output flow rate data—loading 2.</p>
Full article ">Figure 15
<p>Experimental output flow rate data—loading 3.</p>
Full article ">Figure 16
<p>Experimental output flow rate data—loading 4.</p>
Full article ">Figure 17
<p>Experimental output flow rate data–loading 5.</p>
Full article ">Figure 18
<p>Evaluated control action.</p>
Full article ">Figure 19
<p>Measured proportional valve position.</p>
Full article ">Figure 20
<p>Measured pump output pressure.</p>
Full article ">
14 pages, 2032 KiB  
Article
Periodicity Intensity Reveals Insights into Time Series Data: Three Use Cases
by Alan F. Smeaton and Feiyan Hu
Algorithms 2023, 16(2), 119; https://doi.org/10.3390/a16020119 - 15 Feb 2023
Cited by 2 | Viewed by 2155
Abstract
Periodic phenomena are oscillating signals found in many naturally occurring time series. A periodogram can be used to measure the intensities of oscillations at different frequencies over an entire time series, but sometimes, we are interested in measuring how periodicity intensity at a [...] Read more.
Periodic phenomena are oscillating signals found in many naturally occurring time series. A periodogram can be used to measure the intensities of oscillations at different frequencies over an entire time series, but sometimes, we are interested in measuring how periodicity intensity at a specific frequency varies throughout the time series. This can be performed by calculating periodicity intensity within a window, then sliding and recalculating the intensity for the window, giving an indication of how periodicity intensity at a specific frequency changes throughout the series. We illustrate three applications of this, the first of which are the movements of a herd of new-born calves, where we show how intensity in the 24 h periodicity increases and decreases synchronously across the herd. We also show how changes in 24 h periodicity intensity of activities detected from in-home sensors can be indicative of overall wellness. We illustrate this on several weeks of sensor data gathered from each of the homes of 23 older adults. Our third application is the intensity of the 7-day periodicity of hundreds of University students accessing online resources from a virtual learning environment (VLE) and how the regularity of their weekly learning behaviours changes throughout a teaching semester. The paper demonstrates how periodicity intensity reveals insights into time series data not visible using other forms of analysis. Full article
(This article belongs to the Special Issue Machine Learning for Time Series Analysis)
Show Figures

Figure 1

Figure 1
<p>Schematic demonstrating the calculation of periodicity intensity throughout a time series using time-lagged overlapping windows. (<b>a</b>) shows overall periodicity for a time series, (<b>b</b>) shows periodicity calculated for the first 7 days only, (<b>c</b>) shows periodicity for 7 days with a shift of 1 day, (<b>d</b>) shows some sample raw data and (<b>e</b>) shows periodicity intensity calculated for the whole time series.</p>
Full article ">Figure 2
<p>Normalised periodicity intensity from three sample ARC trial participants for a three-month duration. The frequency is 24 h, the window size is 7 days, and the window shift is 1 h. <span class="html-italic">x</span>-axis values span 3 months, and <span class="html-italic">y</span>-axis values have been normalised to the range 0 to 1.</p>
Full article ">Figure 3
<p>Normalised periodicity intensity for a sample of five student participants. The frequency is 24 h, window size is 7 days and window shift or stride is 3 h. <span class="html-italic">y</span>-axis values have been normalised to the range 0 to 1.</p>
Full article ">Figure 4
<p>Stacked line chart of cumulative periodicity intensity from all 169 student participants. <span class="html-italic">y</span>-axis values have been normalised to the range 0 to 1.</p>
Full article ">Figure 5
<p>Line graphs of calf periodicity intensities for each of the 24 calves. Frequency is 24 h, window size is 7 days and window shift is 15 min. The vertical green lines indicate the dates of disbudding.</p>
Full article ">Figure 6
<p>Stacked line chart of cumulative calf periodicity intensity from 19 of the 24 calves, from [<a href="#B31-algorithms-16-00119" class="html-bibr">31</a>]. <span class="html-italic">y</span>-axis values have been normalised to the range 0 to 1.</p>
Full article ">
12 pages, 1947 KiB  
Article
EEG Data Augmentation for Emotion Recognition with a Task-Driven GAN
by Qing Liu, Jianjun Hao and Yijun Guo
Algorithms 2023, 16(2), 118; https://doi.org/10.3390/a16020118 - 15 Feb 2023
Cited by 4 | Viewed by 2678
Abstract
The high cost of acquiring training data in the field of emotion recognition based on electroencephalogram (EEG) is a problem, making it difficult to establish a high-precision model from EEG signals for emotion recognition tasks. Given the outstanding performance of generative adversarial networks [...] Read more.
The high cost of acquiring training data in the field of emotion recognition based on electroencephalogram (EEG) is a problem, making it difficult to establish a high-precision model from EEG signals for emotion recognition tasks. Given the outstanding performance of generative adversarial networks (GANs) in data augmentation in recent years, this paper proposes a task-driven method based on CWGAN to generate high-quality artificial data. The generated data are represented as multi-channel EEG data differential entropy feature maps, and a task network (emotion classifier) is introduced to guide the generator during the adversarial training. The evaluation results show that the proposed method can generate artificial data with clearer classifications and distributions that are more similar to the real data, resulting in obvious improvements in EEG-based emotion recognition tasks. Full article
(This article belongs to the Special Issue Deep Neural Networks and Optimization Algorithms)
Show Figures

Figure 1

Figure 1
<p>The basic structure of GAN.</p>
Full article ">Figure 2
<p>The framework of the network based on CWGAN in the proposed method.</p>
Full article ">Figure 3
<p>Mapping the one-dimensional DE feature vector into a feature matrix according to the spatial distribution of 32 EEG channels.</p>
Full article ">Figure 4
<p>W-distance and MMD between the generated data and the original data under the proposed method and the original CWGAN.</p>
Full article ">Figure 5
<p>Visualization with UMAP to observe the distribution of the original data (<b>a</b>), the data generated by CWGAN (<b>b</b>), and the data generated by the proposed method (<b>c</b>).</p>
Full article ">
12 pages, 747 KiB  
Article
Extrinsic Bayesian Optimization on Manifolds
by Yihao Fang, Mu Niu, Pokman Cheung and Lizhen Lin
Algorithms 2023, 16(2), 117; https://doi.org/10.3390/a16020117 - 15 Feb 2023
Viewed by 2006
Abstract
We propose an extrinsic Bayesian optimization (eBO) framework for general optimization problems on manifolds. Bayesian optimization algorithms build a surrogate of the objective function by employing Gaussian processes and utilizing the uncertainty in that surrogate by deriving an acquisition function. This acquisition function [...] Read more.
We propose an extrinsic Bayesian optimization (eBO) framework for general optimization problems on manifolds. Bayesian optimization algorithms build a surrogate of the objective function by employing Gaussian processes and utilizing the uncertainty in that surrogate by deriving an acquisition function. This acquisition function represents the probability of improvement based on the kernel of the Gaussian process, which guides the search in the optimization process. The critical challenge for designing Bayesian optimization algorithms on manifolds lies in the difficulty of constructing valid covariance kernels for Gaussian processes on general manifolds. Our approach is to employ extrinsic Gaussian processes by first embedding the manifold onto some higher dimensional Euclidean space via equivariant embeddings and then constructing a valid covariance kernel on the image manifold after the embedding. This leads to efficient and scalable algorithms for optimization over complex manifolds. Simulation study and real data analyses are carried out to demonstrate the utilities of our eBO framework by applying the eBO to various optimization problems over manifolds such as the sphere, the Grassmannian, and the manifold of positive definite matrices. Full article
(This article belongs to the Special Issue Gradient Methods for Optimization)
Show Figures

Figure 1

Figure 1
<p>A simple illustration of equivariant embeddings.</p>
Full article ">Figure 2
<p>The iteration steps of the eBO method on the sphere <math display="inline"><semantics> <msup> <mi>S</mi> <mn>2</mn> </msup> </semantics></math>. The data points <math display="inline"><semantics> <mrow> <msub> <mi>x</mi> <mn>1</mn> </msub> <mo>,</mo> <mo>.</mo> <mo>.</mo> <mo>.</mo> <mo>,</mo> <msub> <mi>x</mi> <mi>n</mi> </msub> </mrow> </semantics></math> are plotted as those black points on the same latitude of the sphere. The true extrinsic mean is the south pole <math display="inline"><semantics> <mrow> <mo>(</mo> <mn>0</mn> <mo>,</mo> <mn>0</mn> <mo>,</mo> <mo>−</mo> <mn>1</mn> <mo>)</mo> </mrow> </semantics></math>. We start with those random blue points on the sphere. The outputs of iterations in our Algorithm 1 are marked as red points on the sphere, converging to the ground truth.</p>
Full article ">Figure 3
<p>We compare the eBO method with the gradient descent (GD) method on the sphere by calculating the log error, the L2 distance from the true extrinsic mean. Although the eBO method converges slower than the GD method in the first four steps, by adding those stepping points into the eGP, it achieves better numerical precision with more steps.</p>
Full article ">Figure 4
<p>We compare the eBO method with the Nelder–Mead method on the matrix approximation problem on the Grassmannian. Since the optimal solution is the whole subspace, we calculated the value of function <span class="html-italic">f</span> instead of the error. The minimum of f is around <math display="inline"><semantics> <mrow> <mn>0.5578</mn> </mrow> </semantics></math> and is plotted as the blue line in the figure. It cannot achieve zero loss due to the low dimension constraint. The Nelder–Mead method achieves the minimal subspace around 25 steps and becomes stable after 40 steps. On the other hand, the eBO method converges to the minimum after 10 steps, much faster than the Nelder–Mead method, showing the quick convergence to the optimal solution.</p>
Full article ">Figure 5
<p>Estimated diffusion tensors <math display="inline"><semantics> <mrow> <msub> <mi>g</mi> <mn>1</mn> </msub> <mrow> <mo>(</mo> <msub> <mi>z</mi> <mn>1</mn> </msub> <mo>)</mo> </mrow> <mo>,</mo> <msub> <mi>g</mi> <mn>2</mn> </msub> <mrow> <mo>(</mo> <msub> <mi>z</mi> <mn>1</mn> </msub> <mo>)</mo> </mrow> </mrow> </semantics></math> at first arc length from the healthy group and the HIV+ group are shown as <math display="inline"><semantics> <mrow> <mn>3</mn> <mo>∗</mo> <mn>3</mn> </mrow> </semantics></math> matrix. The horizontal and vertical axis denotes the rows and columns of the matrix. Entry values inside the matrix are represented in different colors. Based on the color bar, differences between healthy and HIV+ groups could be observed, especially on the diagonal elements.</p>
Full article ">
14 pages, 15445 KiB  
Article
PigSNIPE: Scalable Neuroimaging Processing Engine for Minipig MRI
by Michal Brzus, Kevin Knoernschild, Jessica C. Sieren and Hans J. Johnson
Algorithms 2023, 16(2), 116; https://doi.org/10.3390/a16020116 - 15 Feb 2023
Cited by 3 | Viewed by 1852
Abstract
Translation of basic animal research to find effective methods of diagnosing and treating human neurological disorders requires parallel analysis infrastructures. Small animals such as mice provide exploratory animal disease models. However, many interventions developed using small animal models fail to translate to human [...] Read more.
Translation of basic animal research to find effective methods of diagnosing and treating human neurological disorders requires parallel analysis infrastructures. Small animals such as mice provide exploratory animal disease models. However, many interventions developed using small animal models fail to translate to human use due to physical or biological differences. Recently, large-animal minipigs have emerged in neuroscience due to both their brain similarity and economic advantages. Medical image processing is a crucial part of research, as it allows researchers to monitor their experiments and understand disease development. By pairing four reinforcement learning models and five deep learning UNet segmentation models with existing algorithms, we developed PigSNIPE, a pipeline for the automated handling, processing, and analyzing of large-scale data sets of minipig MR images. PigSNIPE allows for image registration, AC-PC alignment, detection of 19 anatomical landmarks, skull stripping, brainmask and intracranial volume segmentation (DICE 0.98), tissue segmentation (DICE 0.82), and caudate-putamen brain segmentation (DICE 0.8) in under two minutes. To the best of our knowledge, this is the first automated pipeline tool aimed at large animal images, which can significantly reduce the time and resources needed for analyzing minipig neuroimages. Full article
(This article belongs to the Special Issue Machine Learning Algorithms for Big Data Analysis)
Show Figures

Figure 1

Figure 1
<p>Simplified view of the pipeline’s dataflow. Input T1w and T2w images undergo brainmask generation in two steps to allow for robust image registration. Segmentation models use registered images to generate an intracranial volume mask, gray and white matter and cerebrospinal fluid tissue segmentation, and caudate and putamen masks. T1w image is also used to detect 19 anatomical landmarks and AC-PC transform, allowing for standardized alignment of all data.</p>
Full article ">Figure 2
<p>Result visualization for low and high-resolution brainmask models on T1 and T2 weighted images. The low-resolution model robustly detected the brain from a large volume, allowing for image cropping and generating an accurate high-resolution brainmask.</p>
Full article ">Figure 3
<p>Intracranial volume mask visualization. Using both T1 and T2 weighted images simultaneously, our model generated exceptionally high-quality masks that only differed from the ground truth in the posterior cutoff point, indicated by the red arrow.</p>
Full article ">Figure 4
<p>Caudate-putamen segmentation mask visualization. The difference image shows the ground truth mask in red with the color outline of our model prediction. The mask generated by our model closely resembles the manually traced ground truth label.</p>
Full article ">Figure 5
<p>Gray and white matter and cerebrospinal fluid segmentation mask visualization. Our model produced masks similar to the Atropos tool.</p>
Full article ">Figure 6
<p>Training convergence curves. Training and validation losses are shown with a logarithmic scale and indicate that all models converged properly. The validation DICE curves use a linear scale and display improvement with the model convergence score.</p>
Full article ">
20 pages, 3553 KiB  
Article
An Energy-Aware Load Balancing Method for IoT-Based Smart Recycling Machines Using an Artificial Chemical Reaction Optimization Algorithm
by Sara Tabaghchi Milan, Mehdi Darbandi, Nima Jafari Navimipour and Senay Yalcın
Algorithms 2023, 16(2), 115; https://doi.org/10.3390/a16020115 - 14 Feb 2023
Cited by 2 | Viewed by 1858
Abstract
Recycling is very important for a sustainable and clean environment. Developed and developing countries are both facing the problem of waste management and recycling issues. On the other hand, the Internet of Things (IoT) is a famous and applicable infrastructure used to provide [...] Read more.
Recycling is very important for a sustainable and clean environment. Developed and developing countries are both facing the problem of waste management and recycling issues. On the other hand, the Internet of Things (IoT) is a famous and applicable infrastructure used to provide connection between physical devices. It is an important technology that has been researched and implemented in recent years that promises to positively influence several industries, including recycling and trash management. The impact of the IoT on recycling and waste management is examined using standard operating practices in recycling. Recycling facilities, for instance, can use IoT to manage and keep an eye on the recycling situation in various places while allocating the logistics for transportation and distribution processes to minimize recycling costs and lead times. So, companies can use historical patterns to track usage trends in their service regions, assess their accessibility to gather resources, and arrange their activities accordingly. Additionally, energy is a significant aspect of the IoT since several devices will be linked to the internet, and the devices, sensors, nodes, and objects are all energy-restricted. Because the devices are constrained by their nature, the load-balancing protocol is crucial in an IoT ecosystem. Due to the importance of this issue, this study presents an energy-aware load-balancing method for IoT-based smart recycling machines using an artificial chemical reaction optimization algorithm. The experimental results indicated that the proposed solution could achieve excellent performance. According to the obtained results, the imbalance degree (5.44%), energy consumption (11.38%), and delay time (9.05%) were reduced using the proposed method. Full article
(This article belongs to the Special Issue AI-Based Algorithms in IoT-Edge Computing)
Show Figures

Figure 1

Figure 1
<p>The IoT architecture: three-layer.</p>
Full article ">Figure 2
<p>Task allocation in IoT.</p>
Full article ">Figure 2 Cont.
<p>Task allocation in IoT.</p>
Full article ">Figure 3
<p>Chemical reaction sorts depicted in schematic form.</p>
Full article ">Figure 4
<p>The demonstration of molecular structure.</p>
Full article ">Figure 5
<p>(<b>a</b>,<b>b</b>) New reactants with k = 2.</p>
Full article ">Figure 6
<p>New reactants with k = 3.</p>
Full article ">Figure 7
<p>Synthesis reaction operation representation.</p>
Full article ">Figure 8
<p>Displacement reaction operation representation.</p>
Full article ">Figure 9
<p>Displacement reaction operation representation.</p>
Full article ">Figure 10
<p>The result for fitness in 100 iterations.</p>
Full article ">Figure 11
<p>Comparison of the results of the load balance degree.</p>
Full article ">Figure 12
<p>Comparison of ABC, GA, PSO, and the proposed method in energy consumption.</p>
Full article ">Figure 13
<p>Comparison of ABC, GA, PSO, and the proposed method in delay time.</p>
Full article ">
17 pages, 3850 KiB  
Article
On-Board Decentralized Observation Planning for LEO Satellite Constellations
by Bingyu Song, Yingwu Chen, Qing Yang, Yahui Zuo, Shilong Xu and Yuning Chen
Algorithms 2023, 16(2), 114; https://doi.org/10.3390/a16020114 - 14 Feb 2023
Cited by 2 | Viewed by 2109
Abstract
The multi-satellite on-board observation planning (MSOOP) is a variant of the multi-agent task allocation problem (MATAP). MSOOP is used to complete the observation task allocation in a fully cooperative mode to maximize the profits of the whole system. In this paper, MSOOP for [...] Read more.
The multi-satellite on-board observation planning (MSOOP) is a variant of the multi-agent task allocation problem (MATAP). MSOOP is used to complete the observation task allocation in a fully cooperative mode to maximize the profits of the whole system. In this paper, MSOOP for LEO satellite constellations is investigated, and the decentralized algorithm is exploited for solving it. The problem description of MSOOP for LEO satellite constellations is detailed. The coupled constraints make MSOOP more complex than other task allocation problems. The improved Consensus-Based Bundle Algorithm (ICBBA), which includes a bundle construction phase and consensus check phase, is proposed. A constraint check and a mask recovery are introduced into bundle construction and consensus check to handle the coupled constraints. The fitness function is adjusted to adapt to the characteristics of different scenes. Experimental results on series instances demonstrate the effectiveness of the proposed algorithm. Full article
Show Figures

Figure 1

Figure 1
<p>Walker-δ (30/3/1, 600 km, 60°) constellation configuration: (<b>a</b>) 3D constellation configuration at time <math display="inline"><semantics> <mrow> <mi>t</mi> <mo>=</mo> <mn>0</mn> </mrow> </semantics></math>; (<b>b</b>) 2D satellite ground tracks at time <math display="inline"><semantics> <mrow> <mi>t</mi> <mo>=</mo> <mn>0</mn> </mrow> </semantics></math>.</p>
Full article ">Figure 2
<p>The communication network topology of Walker-δ (30/3/1, 600 km, 60°) at time <math display="inline"><semantics> <mrow> <mi>t</mi> <mo>=</mo> <mn>0</mn> </mrow> </semantics></math> (connect any two satellites between which ISL is available).</p>
Full article ">Figure 3
<p>The number of repeated claims for the whole constellation after bundle construction varies according to iteration times: (<b>a</b>) Global targets-1500-90/3/1; (<b>b</b>) Regional targets-1500-90/3/1.</p>
Full article ">Figure 4
<p>The number of repeated claims for the whole constellation after bundle construction varies according to iteration times, with 100 tasks arriving dynamically at the 30th iteration: (<b>a</b>) Global targets-1500-90/3/1; (<b>b</b>) Regional targets-1500-90/3/1.</p>
Full article ">
20 pages, 6726 KiB  
Article
Examination of Lemon Bruising Using Different CNN-Based Classifiers and Local Spectral-Spatial Hyperspectral Imaging
by Razieh Pourdarbani, Sajad Sabzi, Mohsen Dehghankar, Mohammad H. Rohban and Juan I. Arribas
Algorithms 2023, 16(2), 113; https://doi.org/10.3390/a16020113 - 14 Feb 2023
Cited by 7 | Viewed by 2974
Abstract
The presence of bruises on fruits often indicates cell damage, which can lead to a decrease in the ability of the peel to keep oxygen away from the fruits, and as a result, oxygen breaks down cell walls and membranes damaging fruit content. [...] Read more.
The presence of bruises on fruits often indicates cell damage, which can lead to a decrease in the ability of the peel to keep oxygen away from the fruits, and as a result, oxygen breaks down cell walls and membranes damaging fruit content. When chemicals in the fruit are oxidized by enzymes such as polyphenol oxidase, the chemical reaction produces an undesirable and apparent brown color effect, among others. Early detection of bruising prevents low-quality fruit from entering the consumer market. Hereupon, the present paper aims at early identification of bruised lemon fruits using 3D-convolutional neural networks (3D-CNN) via a local spectral-spatial hyperspectral imaging technique, which takes into account adjacent image pixel information in both the frequency (wavelength) and spatial domains of a 3D-tensor hyperspectral image of input lemon fruits. A total of 70 sound lemons were picked up from orchards. First, all fruits were labeled and the hyperspectral images (wavelength range 400–1100 nm) were captured as belonging to the healthy (unbruised) class (class label 0). Next, bruising was applied to each lemon by freefall. Then, the hyperspectral images of all bruised samples were captured in a time gap of 8 (class label 1) and 16 h (class label 2) after bruising was induced, thus resulting in a 3-class ternary classification problem. Four well-known 3D-CNN model namely ResNet, ShuffleNet, DenseNet, and MobileNet were used to classify bruised lemons in Python. Results revealed that the highest classification accuracy (90.47%) was obtained by the ResNet model, followed by DenseNet (85.71%), ShuffleNet (80.95%) and MobileNet (73.80%); all over the test set. ResNet model had larger parameter sizes, but it was proven to be trained faster than other models with fewer number of free parameters. ShuffleNet and MobileNet were easier to train and they needed less storage, but they could not achieve a classification error as low as the other two counterparts. Full article
Show Figures

Figure 1

Figure 1
<p>An illustration of our machine learning framework classification task workflow.</p>
Full article ">Figure 2
<p>Setup of proposed hardware system to perform input samples hyperspectral imaging.</p>
Full article ">Figure 3
<p>Some examples of hyperspectral images at the wavelength range of 400–1100 nm: as is apparent from images, both initial and final frequency bands were considered irrelevant and thus discarded.</p>
Full article ">Figure 4
<p>A sample tensor 3D hyperspectral image at a particular fixed spectrum frequency band: dataset consisted of 174 wavelength band images like the one here depicted, with a spectral resolution of 2.5 nm between frequency bands inside (550–900 nm) wavelength range, and (160 × 120) spatial resolution pixels, totaling 19,200 spatial pixels in each spectral band image.</p>
Full article ">Figure 5
<p>Convolutional Neural Networks (CNN) layer with a kernel size 3 and its generated encoded output after convolution.</p>
Full article ">Figure 6
<p>An example of an image classification by a CNN network architecture.</p>
Full article ">Figure 7
<p>Example of a 3D-CNN with a 3D kernel depicted as an orange box.</p>
Full article ">Figure 8
<p>Example of Residual Connections in the building block of ResNet architecture.</p>
Full article ">Figure 9
<p>Building block of ShuffleNet depicted with Channel Shuffle and Pointwise Group Convolution in it.</p>
Full article ">Figure 10
<p>Example of Dense Blocks depicted in DenseNet architecture.</p>
Full article ">Figure 11
<p>Building block of MobileNet containing Depthwise Convolution and Pointwise Convolution boxes.</p>
Full article ">Figure 12
<p>Train (solid orange) and validation (solid blue) cross-entropy (CE) loss and classification accuracy (%) examples, after 100 epochs: ResNet, DenseNet, ShuffleNet, MobileNet.</p>
Full article ">Figure 12 Cont.
<p>Train (solid orange) and validation (solid blue) cross-entropy (CE) loss and classification accuracy (%) examples, after 100 epochs: ResNet, DenseNet, ShuffleNet, MobileNet.</p>
Full article ">Figure 13
<p>Precision-Recall curve for ResNet model. (<b>a</b>): for the trained model, (<b>b</b>): for model separated by each class.</p>
Full article ">Figure 13 Cont.
<p>Precision-Recall curve for ResNet model. (<b>a</b>): for the trained model, (<b>b</b>): for model separated by each class.</p>
Full article ">Figure 14
<p>Precision-Recall curve for DenseNet model. (<b>a</b>): for the trained model, (<b>b</b>): for model separated by each class.</p>
Full article ">Figure 15
<p>Precision-Recall curve for ShuffleNet model. (<b>a</b>): for the trained model, (<b>b</b>): for model separated by each class.</p>
Full article ">Figure 16
<p>Precision-Recall curve for MobileNet model. (<b>a</b>): for the trained model, (<b>b</b>): for model separated by each class.</p>
Full article ">Figure 17
<p>Receiver Operation Characteristic (ROC) curve for each model (Micro averaged on all classes and for each class): (<b>a</b>) ResNet, (<b>b</b>) DenseNet, (<b>c</b>) ShuffleNet, and (<b>d</b>) MobileNet.</p>
Full article ">
19 pages, 4618 KiB  
Article
V-SOC4AS: A Vehicle-SOC for Improving Automotive Security
by Vita Santa Barletta, Danilo Caivano, Mirko De Vincentiis, Azzurra Ragone, Michele Scalera and Manuel Ángel Serrano Martín
Algorithms 2023, 16(2), 112; https://doi.org/10.3390/a16020112 - 14 Feb 2023
Cited by 17 | Viewed by 4007
Abstract
Integrating embedded systems into next-generation vehicles is proliferating as they increase safety, efficiency, and driving comfort. These functionalities are provided by hundreds of electronic control units (ECUs) that communicate with each other using various protocols that, if not properly designed, may be vulnerable [...] Read more.
Integrating embedded systems into next-generation vehicles is proliferating as they increase safety, efficiency, and driving comfort. These functionalities are provided by hundreds of electronic control units (ECUs) that communicate with each other using various protocols that, if not properly designed, may be vulnerable to local or remote attacks. The paper presents a vehicle-security operation center for improving automotive security (V-SOC4AS) to enhance the detection, response, and prevention of cyber-attacks in the automotive context. The goal is to monitor in real-time each subsystem of intra-vehicle communication, that is controller area network (CAN), local interconnect network (LIN), FlexRay, media oriented systems transport (MOST), and Ethernet. Therefore, to achieve this goal, security information and event management (SIEM) was used to monitor and detect malicious attacks in intra-vehicle and inter-vehicle communications: messages transmitted between vehicle ECUs; infotainment and telematics systems, which provide passengers with entertainment capabilities and information about the vehicle system; and vehicular ports, which allow vehicles to connect to diagnostic devices, upload content of various types. As a result, this allows the automation and improvement of threat detection and incident response processes. Furthermore, the V-SOC4AS allows the classification of the received message as malicious and non-malicious and acquisition of additional information about the type of attack. Thus, this reduces the detection time and provides more support for response activities. Experimental evaluation was conducted on two state-of-the-art attacks: denial of service (DoS) and fuzzing. An open-source dataset was used to simulate the vehicles. V-SOC4AS exploits security information and event management to analyze the packets sent by a vehicle using a rule-based mechanism. If the payload contains a CAN frame attack, it is notified to the SOC analysts. Full article
(This article belongs to the Section Evolutionary Algorithms and Machine Learning)
Show Figures

Figure 1

Figure 1
<p>V-SOC4AS architecture.</p>
Full article ">Figure 2
<p>Log source created to receive the CAN messages.</p>
Full article ">Figure 3
<p>An example of property created on QRadar to obtain the value of key “DATA”.</p>
Full article ">Figure 4
<p>Event ID and event category used to create a new QID named ECU data transfer.</p>
Full article ">Figure 5
<p>The CAN messages generated by ICSim that are sent on the vcan0.</p>
Full article ">Figure 6
<p>Messages generated by ICSim and transformed into JSON format by the TCU component.</p>
Full article ">Figure 7
<p>Result after creating all properties. On console it can be seen the correctly formatted payload.</p>
Full article ">Figure 8
<p>The simulated architecture using ICSim and IBM Qradar.</p>
Full article ">Figure 9
<p>Process of sending, receiving, and handling messages.</p>
Full article ">Figure 10
<p>DoS rule in QRadar.</p>
Full article ">Figure 11
<p>Example of JSON messages that correspond to DoS attack.</p>
Full article ">Figure 12
<p>Rule Wizard with the field used to identify the DoS attack.</p>
Full article ">Figure 13
<p>Generated offenses when a DoS attack is detected.</p>
Full article ">Figure 14
<p>The JSON messages created to test the Fuzzing rule.</p>
Full article ">Figure 15
<p>Fuzzing rule in QRadar.</p>
Full article ">Figure 16
<p>The actions chosen for the fuzzing attack.</p>
Full article ">Figure 17
<p>Generated offenses when a fuzzing attack is detected. (<b>a</b>) Shows the offense regarding the vehicle model OpelAstra with five identified attacks (red rectangle). In (<b>b</b>) the figure refers to the RenaultClio with five identified attacks.</p>
Full article ">
15 pages, 574 KiB  
Article
Learning Data for Neural-Network-Based Numerical Solution of PDEs: Application to Dirichlet-to-Neumann Problems
by Ferenc Izsák and Taki Eddine Djebbar
Algorithms 2023, 16(2), 111; https://doi.org/10.3390/a16020111 - 14 Feb 2023
Cited by 2 | Viewed by 1743
Abstract
We propose neural-network-based algorithms for the numerical solution of boundary-value problems for the Laplace equation. Such a numerical solution is inherently mesh-free, and in the approximation process, stochastic algorithms are employed. The chief challenge in the solution framework is to generate appropriate learning [...] Read more.
We propose neural-network-based algorithms for the numerical solution of boundary-value problems for the Laplace equation. Such a numerical solution is inherently mesh-free, and in the approximation process, stochastic algorithms are employed. The chief challenge in the solution framework is to generate appropriate learning data in the absence of the solution. Our main idea was to use fundamental solutions for this purpose and make a link with the so-called method of fundamental solutions. In this way, beyond the classical boundary-value problems, Dirichlet-to-Neumann operators can also be approximated. This problem was investigated in detail. Moreover, for this complex problem, low-rank approximations were constructed. Such efficient solution algorithms can serve as a basis for computational electrical impedance tomography. Full article
(This article belongs to the Special Issue Computational Methods and Optimization for Numerical Analysis)
Show Figures

Figure 1

Figure 1
<p>The computational domain with the boundary points (red stars), the corresponding outward normals, and the outer points (blue line).</p>
Full article ">Figure 2
<p>Learning performance with the fully connected input and output layers.</p>
Full article ">Figure 3
<p>Learning performance using locally connected layers.</p>
Full article ">Figure 4
<p>Learning performance for the interior points.</p>
Full article ">Figure 5
<p>Approximation in the interior points for the computation of Neumann data.</p>
Full article ">Figure 6
<p>The neural network prediction of the Neumann data and the real Neumann data for the model problem in the case of the first approach.</p>
Full article ">Figure 7
<p>The neural network prediction of the Neumann data and the real Neumann data for the model problem in the case of the second approach.</p>
Full article ">Figure 8
<p>The learning performance of the neural network with one dense intermediate (hidden) layer of size 21.</p>
Full article ">Figure 9
<p>The predicted Neumann data and their smoothed version in comparison with the real one for the low-rank approximation in case of the first approach.</p>
Full article ">
13 pages, 1355 KiB  
Article
Model Parallelism Optimization for CNN FPGA Accelerator
by Jinnan Wang, Weiqin Tong and Xiaoli Zhi
Algorithms 2023, 16(2), 110; https://doi.org/10.3390/a16020110 - 14 Feb 2023
Cited by 7 | Viewed by 3700
Abstract
Convolutional neural networks (CNNs) have made impressive achievements in image classification and object detection. For hardware with limited resources, it is not easy to achieve CNN inference with a large number of parameters without external storage. Model parallelism is an effective way to [...] Read more.
Convolutional neural networks (CNNs) have made impressive achievements in image classification and object detection. For hardware with limited resources, it is not easy to achieve CNN inference with a large number of parameters without external storage. Model parallelism is an effective way to reduce resource usage by distributing CNN inference among several devices. However, parallelizing a CNN model is not easy, because CNN models have an essentially tightly-coupled structure. In this work, we propose a novel model parallelism method to decouple the CNN structure with group convolution and a new channel shuffle procedure. Our method could eliminate inter-device synchronization while reducing the memory footprint of each device. Using the proposed model parallelism method, we designed a parallel FPGA accelerator for the classic CNN model ShuffleNet. This accelerator was further optimized with features such as aggregate read and kernel vectorization to fully exploit the hardware-level parallelism of the FPGA. We conducted experiments with ShuffleNet on two FPGA boards, each of which had an Intel Arria 10 GX1150 and 16GB DDR3 memory. The experimental results showed that when using two devices, ShuffleNet achieved a 1.42× speed increase and reduced its memory footprint by 34%, as compared to its non-parallel counterpart, while maintaining accuracy. Full article
(This article belongs to the Section Algorithms for Multidisciplinary Applications)
Show Figures

Figure 1

Figure 1
<p>FPGA design flow of OpenCL-based CNN accelerator.</p>
Full article ">Figure 2
<p>Partitioning method for convolutional layer (number of devices = 3).</p>
Full article ">Figure 3
<p>Group convolution (different colors represent different groups).</p>
Full article ">Figure 4
<p>Model parallel computing architecture.</p>
Full article ">Figure 5
<p>Proposed FPGA internal design.</p>
Full article ">Figure 6
<p>Comparison of computing time of different layers of <span class="html-italic">I-ShuffleNet</span>.</p>
Full article ">
22 pages, 710 KiB  
Article
Towards a Flexible Assessment of Compliance with Clinical Protocols Using Fuzzy Aggregation Techniques
by Anna Wilbik, Irene Vanderfeesten, Dennis Bergmans, Serge Heines, Oktay Turetken and Walther van Mook
Algorithms 2023, 16(2), 109; https://doi.org/10.3390/a16020109 - 13 Feb 2023
Cited by 3 | Viewed by 2549
Abstract
In healthcare settings, compliance with clinical protocols and medical guidelines is important to ensure high-quality, safe and effective treatment of patients. How to measure compliance and how to represent compliance information in an interpretable and actionable way is still an open challenge. In [...] Read more.
In healthcare settings, compliance with clinical protocols and medical guidelines is important to ensure high-quality, safe and effective treatment of patients. How to measure compliance and how to represent compliance information in an interpretable and actionable way is still an open challenge. In this paper, we propose new metrics for compliance assessments. For this purpose, we use two fuzzy aggregation techniques, namely the OWA operator and the Sugeno integral. The proposed measures take into consideration three factors: (i) the degree of compliance with a single activity, (ii) the degree of compliance of a patient, and (iii) the importance of the activities. The proposed measures are applied to two clinical protocols used in practice. We demonstrate that the proposed measures for compliance can further aid clinicians in assessing the aspect of protocol compliance when evaluating the effectiveness of implemented clinical protocols. Full article
(This article belongs to the Special Issue Artificial Intelligence Algorithms for Healthcare)
Show Figures

Figure 1

Figure 1
<p>Compliance in the medical domain defined, showing the general definition by the U.S. National Library of Medicine [<a href="#B34-algorithms-16-00109" class="html-bibr">34</a>] and the different perspectives of patient adherence [<a href="#B31-algorithms-16-00109" class="html-bibr">31</a>,<a href="#B32-algorithms-16-00109" class="html-bibr">32</a>] and provider adherence [<a href="#B17-algorithms-16-00109" class="html-bibr">17</a>,<a href="#B33-algorithms-16-00109" class="html-bibr">33</a>], including the perspective of treatment compliance, as proposed in this paper. (Images by Freepik).</p>
Full article ">Figure 2
<p>Membership of a fuzzy set defining compliant dose of a medication.</p>
Full article ">Figure 3
<p>Example of a clinical protocol.</p>
Full article ">Figure 4
<p>The weaning protocol used in the case study.</p>
Full article ">Figure 5
<p>Three dimensions for a protocol compliance analysis.</p>
Full article ">
23 pages, 4918 KiB  
Review
Algorithms in Low-Code-No-Code for Research Applications: A Practical Review
by Fahim Sufi
Algorithms 2023, 16(2), 108; https://doi.org/10.3390/a16020108 - 13 Feb 2023
Cited by 28 | Viewed by 11617
Abstract
Algorithms have evolved from machine code to low-code-no-code (LCNC) in the past 20 years. Observing the growth of LCNC-based algorithm development, the CEO of GitHub mentioned that the future of coding is no coding at all. This paper systematically reviewed several of the [...] Read more.
Algorithms have evolved from machine code to low-code-no-code (LCNC) in the past 20 years. Observing the growth of LCNC-based algorithm development, the CEO of GitHub mentioned that the future of coding is no coding at all. This paper systematically reviewed several of the recent studies using mainstream LCNC platforms to understand the area of research, the LCNC platforms used within these studies, and the features of LCNC used for solving individual research questions. We identified 23 research works using LCNC platforms, such as SetXRM, the vf-OS platform, Aure-BPM, CRISP-DM, and Microsoft Power Platform (MPP). About 61% of these existing studies resorted to MPP as their primary choice. The critical research problems solved by these research works were within the area of global news analysis, social media analysis, landslides, tornadoes, COVID-19, digitization of process, manufacturing, logistics, and software/app development. The main reasons identified for solving research problems with LCNC algorithms were as follows: (1) obtaining research data from multiple sources in complete automation; (2) generating artificial intelligence-driven insights without having to manually code them. In the course of describing this review, this paper also demonstrates a practical approach to implement a cyber-attack monitoring algorithm with the most popular LCNC platform. Full article
(This article belongs to the Collection Featured Reviews of Algorithms)
Show Figures

Figure 1

Figure 1
<p>Evolution of algorithms from machine code to low-code-no-code.</p>
Full article ">Figure 2
<p>Methodology for reviewing the existing literature on LCNC platforms to answer research questions.</p>
Full article ">Figure 3
<p>Aggregation of cyber-attack data from multiple sources using Microsoft Power Automate Desktop UI flow [<a href="#B57-algorithms-16-00108" class="html-bibr">57</a>].</p>
Full article ">Figure 4
<p>Implementation of complex AI-based algorithms, such as sentiment analysis, named entity recognition, category classification, language translation using Microsoft Power Automate cloud flow [<a href="#B57-algorithms-16-00108" class="html-bibr">57</a>].</p>
Full article ">Figure 5
<p>CNN-based deep learning Algorithm used for identifying anomalies in cyber-attacks for the Republic of Palau.</p>
Full article ">Figure 6
<p>Visualization of cyber-attack data on Microsoft Power BI [<a href="#B49-algorithms-16-00108" class="html-bibr">49</a>] without writing a single line of code.</p>
Full article ">Figure 7
<p>Global cyber-attack data of different types are demonstrated on a deployed Android app on a Samsung Galaxy Note 10 Lite Mobile.</p>
Full article ">Figure 8
<p>Global cyber-attack data along with cyber-related social media data being shown on a deployed iOS App on an Apple iPad, ninth generation.</p>
Full article ">
14 pages, 6333 KiB  
Article
Self-Sustainability Assessment for a High Building Based on Linear Programming and Computational Fluid Dynamics
by Carlos Oliveira, José Baptista and Adelaide Cerveira
Algorithms 2023, 16(2), 107; https://doi.org/10.3390/a16020107 - 13 Feb 2023
Cited by 2 | Viewed by 1747
Abstract
With excess energy use from non-renewable sources, new energy generation solutions must be adopted to make up for this excess. In this sense, the integration of renewable energy sources in high-rise buildings reduces the need for energy from the national power grid to [...] Read more.
With excess energy use from non-renewable sources, new energy generation solutions must be adopted to make up for this excess. In this sense, the integration of renewable energy sources in high-rise buildings reduces the need for energy from the national power grid to maximize the self-sustainability of common services. Moreover, self-consumption in low-voltage and medium-voltage networks strongly facilitates a reduction in external energy dependence. For consumers, the benefits of installing small wind turbines and energy storage systems include tax benefits and reduced electricity bills as well as a profitable system after the payback period. This paper focuses on assessing the wind potential in a high-rise building through computational fluid dynamics (CFD) simulations, quantifying the potential for wind energy production by small wind turbines (WT) at the installation site. Furthermore, a mathematical model is proposed to optimize wind energy production for a self-consumption system to minimize the total cost of energy purchased from the grid, maximizing the return on investment. The potential of a CFD-based project practice that has wide application in developing the most varied processes and equipment results in a huge reduction in the time and costs spent compared to conventional practices. Furthermore, the optimization model guarantees a significant decrease in the energy purchased at peak hours through the energy stored in energy storage systems (ESS). The results show that the efficiency of the proposed model leads to an investment amortization period of 7 years for a lifetime of 20 years. Full article
(This article belongs to the Special Issue Optimization in Renewable Energy Systems)
Show Figures

Figure 1

Figure 1
<p>Wind rose for the case study adopted.</p>
Full article ">Figure 2
<p>Turbine power curves.</p>
Full article ">Figure 3
<p>Top view of the tridimensional model.</p>
Full article ">Figure 4
<p>Building load profile.</p>
Full article ">Figure 5
<p>Speed contours in the north–south plane in the flow of air through buildings.</p>
Full article ">Figure 6
<p>Top view of wind speed at the top of buildings.</p>
Full article ">Figure 7
<p>Scenario identification for the installation of wind turbines in the building’s rooftop.</p>
Full article ">Figure 8
<p>Energy purchased from the grid for the scenarios presented.</p>
Full article ">Figure 9
<p>Monetary balance of investment for the different scenarios.</p>
Full article ">
3 pages, 177 KiB  
Editorial
Special Issue on Logic-Based Artificial Intelligence
by Giovanni Amendola
Algorithms 2023, 16(2), 106; https://doi.org/10.3390/a16020106 - 13 Feb 2023
Viewed by 2318
Abstract
Since its inception, research in the field of Artificial Intelligence (AI) has had a fundamentally logical approach; therefore, discussions have taken place to establish a way of distinguishing symbolic AI from sub-symbolic AI, basing the approach instead on the statistical approaches typical of [...] Read more.
Since its inception, research in the field of Artificial Intelligence (AI) has had a fundamentally logical approach; therefore, discussions have taken place to establish a way of distinguishing symbolic AI from sub-symbolic AI, basing the approach instead on the statistical approaches typical of machine learning, deep learning or Bayesian networks [...] Full article
(This article belongs to the Special Issue Logic-Based Artificial Intelligence)
34 pages, 870 KiB  
Article
Union Models for Model Families: Efficient Reasoning over Space and Time
by Sanaa Alwidian, Daniel Amyot and Yngve Lamo
Algorithms 2023, 16(2), 105; https://doi.org/10.3390/a16020105 - 11 Feb 2023
Cited by 1 | Viewed by 1988
Abstract
A model family is a set of related models in a given language, with commonalities and variabilities that result from evolution of models over time and/or variation over intended usage (the spatial dimension). As the family size increases, it becomes cumbersome to analyze [...] Read more.
A model family is a set of related models in a given language, with commonalities and variabilities that result from evolution of models over time and/or variation over intended usage (the spatial dimension). As the family size increases, it becomes cumbersome to analyze models individually. One solution is to represent a family using one global model that supports analysis. In this paper, we propose the concept of union model as a complete and concise representation of all members of a model family. We use graph theory to formalize a model family as a set of attributed typed graphs in which all models are typed over the same metamodel. The union model is formalized as the union of all graph elements in the family. These graph elements are annotated with their corresponding model versions and configurations. This formalization is independent from the modeling language used. We also demonstrate how union models can be used to perform reasoning tasks on model families, e.g., trend analysis and property checking. Empirical results suggest potential time-saving benefits when using union models for analysis and reasoning over a set of models all at once as opposed to separately analyzing single models one at a time. Full article
Show Figures

Figure 1

Figure 1
<p>Goal model family of regulations.</p>
Full article ">Figure 2
<p>Goal model family of regulations with variability in space and time.</p>
Full article ">Figure 3
<p>A union model for the model family in <a href="#algorithms-16-00105-f001" class="html-fig">Figure 1</a>.</p>
Full article ">Figure 4
<p>Relationship between models and their graphical representation.</p>
Full article ">Figure 5
<p>Graph morphism between (directed) graphs.</p>
Full article ">Figure 6
<p>Type graph (<b>a</b>) and Typed graph (<b>b</b>). The star (*) indicates that zero or more instances of the class “Transition” are associated with one instance of the class “State”.</p>
Full article ">Figure 7
<p>Typed graph morphism.</p>
Full article ">Figure 8
<p>An attributed type graph (ATG). The star (*) indicates that zero or more instances of the class “Transition” are associated with one instance of the class “State”.</p>
Full article ">Figure 9
<p>A typed attributed graph, typed over the ATG in <a href="#algorithms-16-00105-f008" class="html-fig">Figure 8</a>.</p>
Full article ">Figure 10
<p>A visualization of an E-graph.</p>
Full article ">Figure 11
<p>An E-Graph, EG, with node attributes represented as edges. The star (*) indicates that zero or more instances of the class “Transition” are associated with one instance of the class “State”.</p>
Full article ">Figure 12
<p>An instance typed graph ITG of the E-graph EG in <a href="#algorithms-16-00105-f011" class="html-fig">Figure 11</a>.</p>
Full article ">Figure 13
<p><span class="html-italic">GraphToPropositionWithAnnotation</span> encoding of model M in <a href="#algorithms-16-00105-f012" class="html-fig">Figure 12</a>.</p>
Full article ">Figure 14
<p>First version of a state transition diagram, M1.</p>
Full article ">Figure 15
<p>Representation of M1 as an E-graph.</p>
Full article ">Figure 16
<p>Propositional encoding of M1.</p>
Full article ">Figure 17
<p>Second version of a state transition diagram, M2.</p>
Full article ">Figure 18
<p>Representation of M2 as an E-graph.</p>
Full article ">Figure 19
<p>Propositional encoding of M2.</p>
Full article ">Figure 20
<p>Union of the propositional encodings of M1 and M2.</p>
Full article ">Figure 21
<p>Representation of <math display="inline"><semantics> <msub> <mi>M</mi> <mi>U</mi> </msub> </semantics></math> as an E-graph.</p>
Full article ">Figure 22
<p>Conventional representation of <math display="inline"><semantics> <msub> <mi>M</mi> <mi>U</mi> </msub> </semantics></math> as an annotated state transition diagram.</p>
Full article ">Figure 23
<p>An example of propositional encoding of a model (<math display="inline"><semantics> <mrow> <mi mathvariant="sans-serif">Φ</mi> <mi>m</mi> </mrow> </semantics></math>).</p>
Full article ">Figure 24
<p>(<b>a</b>) An acyclic model M1, (<b>b</b>) an acyclic model M2, and (<b>c</b>) a union model of M1 and M2 that is cyclic. Note: these three models satisfy <math display="inline"><semantics> <mrow> <mi mathvariant="sans-serif">Φ</mi> <mi>p</mi> </mrow> </semantics></math>, as they have no self-loops.</p>
Full article ">Figure 25
<p>Results for property checking (RT1) for all <span class="html-italic">INDV</span> and <span class="html-italic">SIZE</span> categories.</p>
Full article ">Figure 26
<p>Results for trend analysis (RT2) for all <span class="html-italic">INDV</span> and <span class="html-italic">SIZE</span> categories.</p>
Full article ">Figure 27
<p>Results for commonality analysis (RT3) for all <span class="html-italic">INDV</span> and <span class="html-italic">SIZE</span> categories.</p>
Full article ">
20 pages, 520 KiB  
Article
Quadratic Multilinear Discriminant Analysis for Tensorial Data Classification
by Cristian Minoccheri, Olivia Alge, Jonathan Gryak, Kayvan Najarian and Harm Derksen
Algorithms 2023, 16(2), 104; https://doi.org/10.3390/a16020104 - 11 Feb 2023
Cited by 1 | Viewed by 1704
Abstract
Over the past decades, there has been an increase of attention to adapting machine learning methods to fully exploit the higher order structure of tensorial data. One problem of great interest is tensor classification, and in particular the extension of linear discriminant analysis [...] Read more.
Over the past decades, there has been an increase of attention to adapting machine learning methods to fully exploit the higher order structure of tensorial data. One problem of great interest is tensor classification, and in particular the extension of linear discriminant analysis to the multilinear setting. We propose a novel method for multilinear discriminant analysis that is radically different from the ones considered so far, and it is the first extension to tensors of quadratic discriminant analysis. Our proposed approach uses invariant theory to extend the nearest Mahalanobis distance classifier to the higher-order setting, and to formulate a well-behaved optimization problem. We extensively test our method on a variety of synthetic data, outperforming previously proposed MDA techniques. We also show how to leverage multi-lead ECG data by constructing tensors via taut string, and use our method to classify healthy signals versus unhealthy ones; our method outperforms state-of-the-art MDA methods, especially after adding significant levels of noise to the signals. Our approach reached an AUC of 0.95(0.03) on clean signals—where the second best method reached 0.91(0.03)—and an AUC of 0.89(0.03) after adding noise to the signals (with a signal-to-noise-ratio of 30)—where the second best method reached 0.85(0.05). Our approach is fundamentally different than previous work in this direction, and proves to be faster, more stable, and more accurate on the tests we performed. Full article
(This article belongs to the Section Algorithms for Multidisciplinary Applications)
Show Figures

Figure 1

Figure 1
<p>Graphical representation of Algorithm 1 in the case of matrix data.</p>
Full article ">Figure 2
<p>Graphical representation of Algorithm 2 in the case of matrix data.</p>
Full article ">Figure 3
<p>Construction of tensors from the PhysioNet PTB dataset for each patient.</p>
Full article ">
18 pages, 633 KiB  
Article
Local Convergence Analysis of a One Parameter Family of Simultaneous Methods with Applications to Real-World Problems
by Tsonyo M. Pavkov, Valentin G. Kabadzhov, Ivan K. Ivanov and Stoil I. Ivanov
Algorithms 2023, 16(2), 103; https://doi.org/10.3390/a16020103 - 10 Feb 2023
Cited by 4 | Viewed by 1569
Abstract
In this paper, we provide a detailed local convergence analysis of a one-parameter family of iteration methods for the simultaneous approximation of polynomial zeros due to Ivanov (Numer. Algor. 75(4): 1193–1204, 2017). Thus, we obtain two local convergence theorems that provide sufficient conditions [...] Read more.
In this paper, we provide a detailed local convergence analysis of a one-parameter family of iteration methods for the simultaneous approximation of polynomial zeros due to Ivanov (Numer. Algor. 75(4): 1193–1204, 2017). Thus, we obtain two local convergence theorems that provide sufficient conditions to guarantee the Q-cubic convergence of all members of the family. Among the other contributions, our results unify the latest such kind of results of the well known Dochev–Byrnev and Ehrlich methods. Several practical applications are further given to emphasize the advantages of the studied family of methods and to show the applicability of the theoretical results. Full article
Show Figures

Figure 1

Figure 1
<p>Graph of the functions <math display="inline"><semantics> <msub> <mi>ϕ</mi> <mn>0</mn> </msub> </semantics></math>, <math display="inline"><semantics> <msub> <mi>ϕ</mi> <mrow> <mn>1</mn> <mo>/</mo> <mn>2</mn> </mrow> </msub> </semantics></math>, <math display="inline"><semantics> <msub> <mi>ϕ</mi> <mn>1</mn> </msub> </semantics></math>, <math display="inline"><semantics> <msub> <mi>ϕ</mi> <mrow> <mi>α</mi> <mn>1</mn> </mrow> </msub> </semantics></math> and <math display="inline"><semantics> <msub> <mi>ϕ</mi> <mrow> <mi>α</mi> <mn>2</mn> </mrow> </msub> </semantics></math> for <math display="inline"><semantics> <mrow> <mi>n</mi> <mo>=</mo> <mn>5</mn> </mrow> </semantics></math>.</p>
Full article ">Figure 2
<p>Trajectories of approximations for Example 1. (<b>a</b>) For <math display="inline"><semantics> <mrow> <mi>α</mi> <mo>=</mo> <mn>1</mn> </mrow> </semantics></math> (Ehrlich’s method). (<b>b</b>) For <math display="inline"><semantics> <mrow> <mi>α</mi> <mo>=</mo> <mn>0.7669</mn> <mo>+</mo> <mn>0.4847</mn> <mi>i</mi> </mrow> </semantics></math>.</p>
Full article ">Figure 3
<p>Basins of attraction for Example 1. (<b>a</b>) Dochev–Byrnev’s method (<math display="inline"><semantics> <mrow> <mi>α</mi> <mo>=</mo> <mn>0</mn> </mrow> </semantics></math>). (<b>b</b>) Ehrlich’s method (<math display="inline"><semantics> <mrow> <mi>α</mi> <mo>=</mo> <mn>1</mn> </mrow> </semantics></math>). (<b>c</b>) The method by <math display="inline"><semantics> <mrow> <mi>α</mi> <mo>=</mo> <mn>1</mn> <mo>/</mo> <mn>2</mn> </mrow> </semantics></math>. (<b>d</b>) The method by <math display="inline"><semantics> <mrow> <mi>α</mi> <mo>=</mo> <mn>0.7669</mn> <mo>+</mo> <mn>0.4847</mn> <mi>i</mi> </mrow> </semantics></math>.</p>
Full article ">Figure 3 Cont.
<p>Basins of attraction for Example 1. (<b>a</b>) Dochev–Byrnev’s method (<math display="inline"><semantics> <mrow> <mi>α</mi> <mo>=</mo> <mn>0</mn> </mrow> </semantics></math>). (<b>b</b>) Ehrlich’s method (<math display="inline"><semantics> <mrow> <mi>α</mi> <mo>=</mo> <mn>1</mn> </mrow> </semantics></math>). (<b>c</b>) The method by <math display="inline"><semantics> <mrow> <mi>α</mi> <mo>=</mo> <mn>1</mn> <mo>/</mo> <mn>2</mn> </mrow> </semantics></math>. (<b>d</b>) The method by <math display="inline"><semantics> <mrow> <mi>α</mi> <mo>=</mo> <mn>0.7669</mn> <mo>+</mo> <mn>0.4847</mn> <mi>i</mi> </mrow> </semantics></math>.</p>
Full article ">Figure 4
<p>Dependence between the optical density and the temperature.</p>
Full article ">Figure 5
<p>Trajectories of approximations for Example 2. (<b>a</b>) For <math display="inline"><semantics> <mrow> <mi>α</mi> <mo>=</mo> <mn>1</mn> </mrow> </semantics></math> (Ehrlich’s method). (<b>b</b>) For <math display="inline"><semantics> <mrow> <mi>α</mi> <mo>=</mo> <mn>0.7669</mn> <mo>+</mo> <mn>0.4847</mn> <mi>i</mi> </mrow> </semantics></math>.</p>
Full article ">Figure 6
<p>Trajectories of approximations for Example 3. (<b>a</b>) For <math display="inline"><semantics> <mrow> <mi>α</mi> <mo>=</mo> <mn>1</mn> </mrow> </semantics></math> (Ehrlich’s method). (<b>b</b>) For <math display="inline"><semantics> <mrow> <mi>α</mi> <mo>=</mo> <mn>0.7669</mn> <mo>+</mo> <mn>0.4847</mn> <mi>i</mi> </mrow> </semantics></math>.</p>
Full article ">
19 pages, 434 KiB  
Article
Metamorphic Testing of Relation Extraction Models
by Yuhe Sun, Zuohua Ding, Hongyun Huang, Senhao Zou and Mingyue Jiang
Algorithms 2023, 16(2), 102; https://doi.org/10.3390/a16020102 - 10 Feb 2023
Viewed by 1787
Abstract
Relation extraction (RE) is a fundamental NLP task that aims to identify relations between some entities regarding a given text. RE forms the basis for many advanced NLP tasks, such as question answering and text summarization, and thus its quality is critical to [...] Read more.
Relation extraction (RE) is a fundamental NLP task that aims to identify relations between some entities regarding a given text. RE forms the basis for many advanced NLP tasks, such as question answering and text summarization, and thus its quality is critical to the relevant downstream applications. However, evaluating the quality of RE models is non-trivial. On the one hand, obtaining ground truth labels for individual test inputs is tedious and even difficult. On the other hand, there is an increasing need to understand the characteristics of RE models in terms of various aspects. To mitigate these issues, this study proposes evaluating RE models by applying metamorphic testing (MT). A total of eight metamorphic relations (MRs) are identified based on three categories of transformation operations, namely replacement, swap, and combination. These MRs encode some expected properties of different aspects of RE. We further apply MT to three popular RE models. Our experiments reveal a large number of prediction failures in the subject RE models, confirming that MT is effective for evaluating RE models. Further analysis of the experimental results reveals the advantages and disadvantages of our subject models and also uncovers some typical issues of RE models. Full article
(This article belongs to the Section Analysis of Algorithms and Complexity Theory)
Show Figures

Figure 1

Figure 1
<p>A motivating example. The head entity is marked in blue, and the tail entity is marked in red.</p>
Full article ">Figure 2
<p>Overview of how metamorphic testing (MT) is applied to evaluate RE models.</p>
Full article ">Figure 3
<p>Comparison of F1 scores and violation rates on different MRs for three RE models.</p>
Full article ">
15 pages, 4402 KiB  
Article
Comparative Analysis of the Methods for Fiber Bragg Structures Spectrum Modeling
by Timur Agliullin, Vladimir Anfinogentov, Oleg Morozov, Airat Sakhabutdinov, Bulat Valeev, Ayna Niyazgulyeva and Yagmyrguly Garovov
Algorithms 2023, 16(2), 101; https://doi.org/10.3390/a16020101 - 10 Feb 2023
Cited by 14 | Viewed by 1982
Abstract
The work is dedicated to a comparative analysis of the following methods for fiber Bragg grating (FBG) spectral response modeling. The Layer Sweep (LS) method, which is similar to the common layer peeling algorithm, is based on the reflectance and transmittance determination for [...] Read more.
The work is dedicated to a comparative analysis of the following methods for fiber Bragg grating (FBG) spectral response modeling. The Layer Sweep (LS) method, which is similar to the common layer peeling algorithm, is based on the reflectance and transmittance determination for the plane waves propagating through layered structures, which results in the solution of a system of linear equations for the transmittance and reflectance of each layer using the sweep method. Another considered method is based on the determination of transfer matrices (TM) for the FBG as a whole. Firstly, a homogeneous FBG was modeled using both methods, and the resulting reflectance spectra were compared to the one obtained via a specialized commercial software package. Secondly, modeling results of a π-phase-shifted FBG were presented and discussed. For both FBG models, the influence of the partition interval of the LS method on the simulated spectrum was studied. Based on the analysis of the simulation data, additional required modeling conditions for phase-shifted FBGs were established, which enhanced the modeling performance of the LS method. Full article
(This article belongs to the Special Issue Algorithms and Calculations in Fiber Optics and Photonics)
Show Figures

Figure 1

Figure 1
<p>Several types of layered structures formed in the optical fiber core: (<b>a</b>) Fabry–Perot resonator (FPR); (<b>b</b>) fiber Bragg grating (FBG); (<b>c</b>) two sequential FBGs; (<b>d</b>) two FBGs recorded one over the other; (<b>e</b>) FBG with π phase shift; (<b>f</b>) FBG with two π phase shifts; (<b>g</b>) FBG and FPR combination.</p>
Full article ">Figure 2
<p>Scheme of a layered structure of a substance with an arbitrary dependence of the refractive index over its thickness.</p>
Full article ">Figure 3
<p>One-dimensional model of a layered structure.</p>
Full article ">Figure 4
<p>Simulated spectra of the homogeneous FBG obtained using the Layer Sweep method (red solid line), Transfer Matrix method (green solid line), OptiGrating software (blue dotted line), and amplified spectra near the reflectance peak (insert).</p>
Full article ">Figure 5
<p>Deviations of the homogeneous FBG spectra from the reference (OptiGrating) spectrum (left axis): deviation of the Layer Sweep method (red line), deviation of the Transfer Matrix method (green line), reference OptiGrating spectrum (black line, right axis).</p>
Full article ">Figure 6
<p>Values of the root-mean-square deviation (RMSD) of the homogeneous FBG spectrum modeled using the LS method (blue dots) depending on the partition interval Δ<span class="html-italic">z</span>, and their approximation (blue solid line).</p>
Full article ">Figure 7
<p>Simulated spectra of the π-phase-shifted FBG obtained using the Layer Sweep method (red solid line), Transfer Matrix method (green solid line), OptiGrating software (blue dotted line), and amplified spectra near the reflectance peak (insert).</p>
Full article ">Figure 8
<p>Deviations of the π-phase-shifted FBG spectra from the reference (OptiGrating) spectrum (left axis): deviation of the Layer Sweep method (red line), deviation of the Transfer Matrix method (green line); and reference OptiGrating spectrum (black line, right axis).</p>
Full article ">Figure 9
<p>Values of the root-mean-square deviation (RMSD) of the π-phase-shifted FBG spectrum modeled using the LS method (blue dots) depending on the partition interval Δ<span class="html-italic">z</span>.</p>
Full article ">Figure 10
<p>Comparison of modeling results of the π-phase-shifted FBG using the Layer Sweep method at different partition intervals: (<b>a</b>) resulting spectra: at Δz = 0.12 × Λ (red solid line), at Δz = 0.13 × Λ (green solid line), OptiGrating spectrum (blue dotted line); (<b>b</b>) refractive index profile of the grating at Δz = 0.12 × Λ; and (<b>c</b>) refractive index profile of the grating at Δz = 0.13 × Λ.</p>
Full article ">Figure 11
<p>Modeling results of the π-phase-shifted FBG using the Layer Sweep method with the partition interval of Δz = (1/7) × Λ: (<b>a</b>) resulting spectra: of LS method (red solid line), OptiGrating spectrum (blue dotted line); (<b>b</b>) and refractive index profile of the modeled grating.</p>
Full article ">Figure 12
<p>Values of the root-mean-square deviation (RMSD) of the phase-shifted FBG spectrum modeled using the LS method with odd number of partition points in the FBG period (blue dots) depending on the partition interval Δ<span class="html-italic">z</span>, and their approximation (blue solid line).</p>
Full article ">
43 pages, 506 KiB  
Review
Assembly and Production Line Designing, Balancing and Scheduling with Inaccurate Data: A Survey and Perspectives
by Yuri N. Sotskov
Algorithms 2023, 16(2), 100; https://doi.org/10.3390/a16020100 - 10 Feb 2023
Cited by 6 | Viewed by 4687
Abstract
Assembly lines (conveyors) are traditional means of large-scale and mass-scale productions. An assembly line balancing problem is needed for optimizing the assembly process by configuring and designing an assembly line for the same or similar types of final products. This problem consists of [...] Read more.
Assembly lines (conveyors) are traditional means of large-scale and mass-scale productions. An assembly line balancing problem is needed for optimizing the assembly process by configuring and designing an assembly line for the same or similar types of final products. This problem consists of designing the assembly line and distributing the total workload for manufacturing each unit of the fixed product to be assembled among the ordered workstations along the constructed assembly line. The assembly line balancing research is focused mainly on simple assembly line balancing problems, which are restricted by a set of conditions making a considered assembly line ideal for research. A lot of published research has been carried out in order to describe and solve (usually heuristically) more realistic generalized assembly line balancing problems. Assembly line designing, balancing and scheduling problems with not deterministic (stochastic, fuzzy or uncertain) parameters have been investigated in many published research works. This paper is about the design and optimization methods for assembly and disassembly lines. We survey the recent developments for designing, balancing and scheduling assembly (disassembly) lines. New formulations of simple assembly line balancing problems are presented in order to take into account modifications and uncertainties characterized by real assembly productions. Full article
(This article belongs to the Special Issue Scheduling: Algorithms and Applications)
28 pages, 953 KiB  
Article
Enhancing Logistic Regression Using Neural Networks for Classification in Actuarial Learning
by George Tzougas and Konstantin Kutzkov
Algorithms 2023, 16(2), 99; https://doi.org/10.3390/a16020099 - 9 Feb 2023
Cited by 6 | Viewed by 5656
Abstract
We developed a methodology for the neural network boosting of logistic regression aimed at learning an additional model structure from the data. In particular, we constructed two classes of neural network-based models: shallow–dense neural networks with one hidden layer and deep neural networks [...] Read more.
We developed a methodology for the neural network boosting of logistic regression aimed at learning an additional model structure from the data. In particular, we constructed two classes of neural network-based models: shallow–dense neural networks with one hidden layer and deep neural networks with multiple hidden layers. Furthermore, several advanced approaches were explored, including the combined actuarial neural network approach, embeddings and transfer learning. The model training was achieved by minimizing either the deviance or the cross-entropy loss functions, leading to fourteen neural network-based models in total. For illustrative purposes, logistic regression and the alternative neural network-based models we propose are employed for a binary classification exercise concerning the occurrence of at least one claim in a French motor third-party insurance portfolio. Finally, the model interpretability issue was addressed via the local interpretable model-agnostic explanations approach. Full article
(This article belongs to the Special Issue Deep Neural Networks and Optimization Algorithms)
Show Figures

Figure 1

Figure 1
<p>A multilayer perceptron neural network with three hidden layers. The last neuron in each layer is the intercept term.</p>
Full article ">Figure 2
<p>Improvements of deviance loss and AUC metrics over epochs.</p>
Full article ">Figure 3
<p>AUC values on the test set achieved using R’s logistic regression function (<b>left</b>) and logistic regression by a shallow neural network (<b>right</b>).</p>
Full article ">Figure 4
<p>AUC values on the test set achieved using a neural network with feature normalization (<b>left</b>) and feature normalization + categorical embeddings (<b>right</b>).</p>
Full article ">Figure 5
<p>AUC values on the test set achieved using logistic regression with embeddings (<b>left</b>) and frozen weights learned by a neural network (<b>right</b>).</p>
Full article ">Figure 6
<p>A tSNE visualization of the 10-dimensional embeddings for the different regions.</p>
Full article ">Figure 7
<p>Feature importance for predicting a positive and negative example for logistic regression (<b>top</b>) and neural networks (<b>bottom</b>).</p>
Full article ">
17 pages, 1788 KiB  
Article
A Novel Intelligent Method for Fault Diagnosis of Steam Turbines Based on T-SNE and XGBoost
by Zhiguo Liang, Lijun Zhang and Xizhe Wang
Algorithms 2023, 16(2), 98; https://doi.org/10.3390/a16020098 - 9 Feb 2023
Cited by 13 | Viewed by 3095
Abstract
Since failure of steam turbines occurs frequently and can causes huge losses for thermal plants, it is important to identify a fault in advance. A novel clustering fault diagnosis method for steam turbines based on t-distribution stochastic neighborhood embedding (t-SNE) and extreme gradient [...] Read more.
Since failure of steam turbines occurs frequently and can causes huge losses for thermal plants, it is important to identify a fault in advance. A novel clustering fault diagnosis method for steam turbines based on t-distribution stochastic neighborhood embedding (t-SNE) and extreme gradient boosting (XGBoost) is proposed in this paper. First, the t-SNE algorithm was used to map the high-dimensional data to the low-dimensional space; and the data clustering method of K-means was performed in the low-dimensional space to distinguish the fault data from the normal data. Then, the imbalance problem in the data was processed by the synthetic minority over-sampling technique (SMOTE) algorithm to obtain the steam turbine characteristic data set with fault labels. Finally, the XGBoost algorithm was used to solve this multi-classification problem. The data set used in this paper was derived from the time series data of a steam turbine of a thermal power plant. In the processing analysis, the method achieved the best performance with an overall accuracy of 97% and an early warning of at least two hours in advance. The experimental results show that this method can effectively evaluate the condition and provide fault warning for power plant equipment. Full article
(This article belongs to the Special Issue Artificial Intelligence for Fault Detection and Diagnosis)
Show Figures

Figure 1

Figure 1
<p>Flow chart of model construction.</p>
Full article ">Figure 2
<p>Two-dimensional features of five faults. (<b>a</b>) Two-dimensional fusion features of Fault 1. (<b>b</b>) Two-dimensional fusion features of Fault 2. (<b>c</b>) Two-dimensional fusion features of Fault 3. (<b>d</b>) Two-dimensional fusion features of Fault 4. (<b>e</b>) Two-dimensional fusion features of Fault 5.</p>
Full article ">Figure 2 Cont.
<p>Two-dimensional features of five faults. (<b>a</b>) Two-dimensional fusion features of Fault 1. (<b>b</b>) Two-dimensional fusion features of Fault 2. (<b>c</b>) Two-dimensional fusion features of Fault 3. (<b>d</b>) Two-dimensional fusion features of Fault 4. (<b>e</b>) Two-dimensional fusion features of Fault 5.</p>
Full article ">Figure 3
<p>Time series data of five faults. (<b>a</b>) Clustering results of Fault 1 based on time series. (<b>b</b>) Clustering results of Fault 2 based on time series. (<b>c</b>) Clustering results of Fault 3 based on time series. (<b>d</b>) Clustering results of Fault 4 based on time series. (<b>e</b>) Clustering results of Fault 5 based on time series.</p>
Full article ">
14 pages, 2372 KiB  
Article
Nemesis: Neural Mean Teacher Learning-Based Emotion-Centric Speaker
by Aryan Yousefi and Kalpdrum Passi
Algorithms 2023, 16(2), 97; https://doi.org/10.3390/a16020097 - 9 Feb 2023
Viewed by 1754
Abstract
Image captioning is the multi-modal task of automatically describing a digital image based on its contents and their semantic relationship. This research area has gained increasing popularity over the past few years; however, most of the previous studies have been focused on purely [...] Read more.
Image captioning is the multi-modal task of automatically describing a digital image based on its contents and their semantic relationship. This research area has gained increasing popularity over the past few years; however, most of the previous studies have been focused on purely objective content-based descriptions of the image scenes. In this study, efforts have been made to generate more engaging captions by leveraging human-like emotional responses. To achieve this task, a mean teacher learning-based method has been applied to the recently introduced ArtEmis dataset. ArtEmis is the first large-scale dataset for emotion-centric image captioning, containing 455K emotional descriptions of 80K artworks from WikiArt. This method includes a self-distillation relationship between memory-augmented language models with meshed connectivity. These language models are trained in a cross-entropy phase and then fine-tuned in a self-critical sequence training phase. According to various popular natural language processing metrics, such as BLEU, METEOR, ROUGE-L, and CIDEr, our proposed model has obtained a new state of the art on ArtEmis. Full article
(This article belongs to the Special Issue Machine Learning Algorithms for Big Data Analysis)
Show Figures

Figure 1

Figure 1
<p>An example from the ArtEmis dataset containing multiple emotional responses for the same artwork. You can see the different descriptions along with their corresponding emotional class (in bold font).</p>
Full article ">Figure 2
<p>The interactions between our two language models: (1) the EMA update according to the student model’s weights. (2) The self-distillation process using the teacher model’s predicted logits passed to the student model, which will be treated as soft labels.</p>
Full article ">Figure 3
<p>The architecture of both the teacher model and the student model. It consists of a stack of memory-augmented encoders and a stack of meshed decoders. The memory-augmented encoder encodes the multi-level visual relationships leveraging the priori knowledge provided by the memory vectors. The meshed decoder generates the textual tokens leveraging the meshed connectivity illustrated by the red arrows.</p>
Full article ">Figure 4
<p>Examples of generated captions for unseen artworks. These samples include utterances from Nemesis model, and EGNemesis model along with the emotional class extracted by the image-to-emotion classifier, which has been utilized in the emotional grounding process. The descriptions contain various human-like emotional expressions, such as “reminds me of my childhood”, “makes me feel nostalgic”.</p>
Full article ">Figure 5
<p>A comparison between the examples of generated captions by EGNemesis and SATEG models along with the emotional class extracted by the image-to-emotion classifier, which has been utilized in the emotional grounding process. It can be observed that the generated utterances by EGNemesis appear to be more abstract, human-like, and emotionally rich.</p>
Full article ">
14 pages, 890 KiB  
Article
Image Quality Assessment for Gibbs Ringing Reduction
by Yue Wang and John J. Healy
Algorithms 2023, 16(2), 96; https://doi.org/10.3390/a16020096 - 9 Feb 2023
Cited by 3 | Viewed by 2118
Abstract
Gibbs ringing is an artefact that is inevitable in any imaging modality where the measurement is Fourier band-limited. It impacts the quality of the image by creating a ringing appearance around discontinuities. Many novel ways of suppressing the artefact have been proposed, including [...] Read more.
Gibbs ringing is an artefact that is inevitable in any imaging modality where the measurement is Fourier band-limited. It impacts the quality of the image by creating a ringing appearance around discontinuities. Many novel ways of suppressing the artefact have been proposed, including machine learning methods, but the quantitative comparisons of the results have frequently been lacking in rigour. In this paper, we examine image quality assessment metrics on three test images with different complexity. We determine six metrics which show promise for simultaneously assessing severity of Gibbs ringing and of other error such as blurring. We examined applying metrics to a region of interest around discontinuities in the image and use the metrics on the resulting region of interest. We demonstrate that the region of interest approach does not improve the performance of the metrics. Finally, we examine the effect of the error threshold parameter in two metrics. Our results will aid development of best practice in comparison of algorithms for the suppression of Gibbs ringing. Full article
Show Figures

Figure 1

Figure 1
<p>The three test images before and after introducing ringing. (<math display="inline"><semantics> <msub> <mi mathvariant="bold-italic">a</mi> <mn mathvariant="bold">1</mn> </msub> </semantics></math>) Original 400 × 400 numerically simulated square. (<math display="inline"><semantics> <msub> <mi mathvariant="bold-italic">b</mi> <mn mathvariant="bold">1</mn> </msub> </semantics></math>) Original 400 × 400 Shepp–Logan phantom. (<math display="inline"><semantics> <msub> <mi mathvariant="bold-italic">c</mi> <mn mathvariant="bold">1</mn> </msub> </semantics></math>) Original 512 × 512 MR image. (<math display="inline"><semantics> <msub> <mi mathvariant="bold-italic">a</mi> <mn mathvariant="bold">2</mn> </msub> </semantics></math>–<math display="inline"><semantics> <msub> <mi mathvariant="bold-italic">c</mi> <mn mathvariant="bold">2</mn> </msub> </semantics></math>) Spectra of (<math display="inline"><semantics> <msub> <mi mathvariant="bold-italic">a</mi> <mn mathvariant="bold">1</mn> </msub> </semantics></math>–<math display="inline"><semantics> <msub> <mi mathvariant="bold-italic">c</mi> <mn mathvariant="bold">1</mn> </msub> </semantics></math>). Fourier coefficients highlighted in red are set to zero, simulating zero padding of a reduced number of measured Fourier coefficients. (<math display="inline"><semantics> <msub> <mi mathvariant="bold-italic">a</mi> <mn mathvariant="bold">3</mn> </msub> </semantics></math>–<math display="inline"><semantics> <msub> <mi mathvariant="bold-italic">c</mi> <mn mathvariant="bold">3</mn> </msub> </semantics></math>) Fourier reconstruction using (<math display="inline"><semantics> <msub> <mi mathvariant="bold-italic">a</mi> <mn mathvariant="bold">2</mn> </msub> </semantics></math>–<math display="inline"><semantics> <msub> <mi mathvariant="bold-italic">c</mi> <mn mathvariant="bold">2</mn> </msub> </semantics></math>) showing visible ringing.</p>
Full article ">Figure 2
<p>The transfer function of Huber loss. <math display="inline"><semantics> <mi>ϵ</mi> </semantics></math> is the transition point.</p>
Full article ">Figure 3
<p>Evaluation of different Gaussian filters using <math display="inline"><semantics> <msubsup> <mo>ℓ</mo> <mi>ϵ</mi> <mn>0</mn> </msubsup> </semantics></math>, SSIM, MS-SSIM, MAE, Huber loss and entropy. In all sections of the figure, we plot the results for the ideal square test image (blue), the Shepp–Logan phantom (red) and an MR head section (yellow). The dotted vertical lines of the same colour indicate a peak/nadir of the three metrics.</p>
Full article ">Figure 4
<p>The optimal reconstructions of the Shepp–Logan phantom from the different metrics. For reference, we also show the ground truth without ringing and the Fourier reconstruction with added ringing.</p>
Full article ">Figure 5
<p>The process of determining the RoI. (<b>a</b>) Original Shepp–Logan phantom. (<b>b</b>) After LoG filter and binarization. (<b>c</b>) Image erosion of (<b>b</b>). (<b>d</b>) Image dilation of (<b>c</b>).</p>
Full article ">Figure 6
<p>1D slice of the Shepp–Logan phantom with ringing. The RoI is in red. The excluded regions are in blue.</p>
Full article ">Figure 7
<p>The behaviours of PSR applied to the whole image (blue) and to the RoI (red). Applied to the RoI, the metric shows a local maximum and a local minimum.</p>
Full article ">Figure 8
<p>(<b>top</b>) SSIM (thick blue) and <math display="inline"><semantics> <msubsup> <mo>ℓ</mo> <mi>ϵ</mi> <mn>0</mn> </msubsup> </semantics></math> for various values of <math display="inline"><semantics> <mi>ϵ</mi> </semantics></math>. (<b>bottom</b>) SSIM (thick blue) and Huber loss for various values of <math display="inline"><semantics> <mi>ϵ</mi> </semantics></math>.</p>
Full article ">Figure 9
<p>(<b>top</b>) Mean squared error as a function of <math display="inline"><semantics> <mrow> <msub> <mo form="prefix">log</mo> <mn>10</mn> </msub> <mi>ϵ</mi> </mrow> </semantics></math> between SSIM and <math display="inline"><semantics> <msubsup> <mo>ℓ</mo> <mi>ϵ</mi> <mn>0</mn> </msubsup> </semantics></math> (blue), and between SSIM and Huber loss (red). Best values of <math display="inline"><semantics> <mi>ϵ</mi> </semantics></math> are identified by the minima. (<b>bottom</b>) Best <math display="inline"><semantics> <mi>σ</mi> </semantics></math> for the Gaussian filter as a function of truncation percentage, as recommended by the three metrics (using <math display="inline"><semantics> <mi>ϵ</mi> </semantics></math> as identified above).</p>
Full article ">
30 pages, 3724 KiB  
Review
Defect Detection Methods for Industrial Products Using Deep Learning Techniques: A Review
by Alireza Saberironaghi, Jing Ren and Moustafa El-Gindy
Algorithms 2023, 16(2), 95; https://doi.org/10.3390/a16020095 - 8 Feb 2023
Cited by 68 | Viewed by 23180
Abstract
Over the last few decades, detecting surface defects has attracted significant attention as a challenging task. There are specific classes of problems that can be solved using traditional image processing techniques. However, these techniques struggle with complex textures in backgrounds, noise, and differences [...] Read more.
Over the last few decades, detecting surface defects has attracted significant attention as a challenging task. There are specific classes of problems that can be solved using traditional image processing techniques. However, these techniques struggle with complex textures in backgrounds, noise, and differences in lighting conditions. As a solution to this problem, deep learning has recently emerged, motivated by two main factors: accessibility to computing power and the rapid digitization of society, which enables the creation of large databases of labeled samples. This review paper aims to briefly summarize and analyze the current state of research on detecting defects using machine learning methods. First, deep learning-based detection of surface defects on industrial products is discussed from three perspectives: supervised, semi-supervised, and unsupervised. Secondly, the current research status of deep learning defect detection methods for X-ray images is discussed. Finally, we summarize the most common challenges and their potential solutions in surface defect detection, such as unbalanced sample identification, limited sample size, and real-time processing. Full article
(This article belongs to the Special Issue Deep Learning Architecture and Applications)
Show Figures

Figure 1

Figure 1
<p>Normal samples of industrial products are compared to defective samples. The first row contains good samples, and the second, third, and fourth rows contain defective samples. The first, second, third, fourth, and fifth columns display wood, grid, capsule, leather, and bill, respectively, and there are three types of defects listed below the image.</p>
Full article ">Figure 2
<p>An example of the result of wood defect detection using the presented technique in [<a href="#B2-algorithms-16-00095" class="html-bibr">2</a>].</p>
Full article ">Figure 3
<p>A camera lens with several defects: (<b>a</b>) original image and (<b>b</b>) converted result based on inspection result and polar coordinate transformation [<a href="#B9-algorithms-16-00095" class="html-bibr">9</a>].</p>
Full article ">Figure 4
<p>The results of insulator defect detection. The green box represents the non-defective insulator, and the red box represents the defective insulator [<a href="#B39-algorithms-16-00095" class="html-bibr">39</a>].</p>
Full article ">Figure 5
<p>Presenting the results of experiments on six defect samples using four methods. The defect types are listed in the first column and include drops tar, shadow, floating, crush, pitted surface and scratch. The results from traditional manual feature extraction methods (CPICS-LBP, AEC-LBP, HWV and the proposed method in [<a href="#B53-algorithms-16-00095" class="html-bibr">53</a>]) are shown in columns 2–5. The experiment compares the proposed method with current state-of-the-art methods in detecting strip steel surface defects.</p>
Full article ">
Previous Issue
Next Issue
Back to TopTop