Nothing Special   »   [go: up one dir, main page]

Next Issue
Volume 16, September
Previous Issue
Volume 16, July
You seem to have javascript disabled. Please note that many of the page functionalities won't work as expected without javascript enabled.
 
 

Algorithms, Volume 16, Issue 8 (August 2023) – 40 articles

Cover Story (view full-size image): Vision-based human activity recognition is crucial in video analytics. Recent strides in deep learning improved action detection, yet at times sacrifice robustness for computational efficiency. This challenge of balancing efficiency and robustness hampers complex action recognition in real time on edge devices. This paper introduces a dual-focused, efficient, and robust approach that is suitable for edge devices. The proposed approach leverages saliency-sensitive spatial-temporal features for action identification. The proposed DA-R3DCNN efficiently extracts vital human-centric features via unified attention and dual layers, bolstered by 3D convolutions. The results indicate that the proposed method achieves up to 74× frames per second (FPS) improvement over contemporary methods, confirming its real-time applicability for activity recognition. View this paper
  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list.
  • You may sign up for e-mail alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.
Order results
Result details
Section
Select all
Export citation of selected articles as:
38 pages, 28537 KiB  
Article
Balancing Project Schedule, Cost, and Value under Uncertainty: A Reinforcement Learning Approach
by Claudio Szwarcfiter, Yale T. Herer and Avraham Shtub
Algorithms 2023, 16(8), 395; https://doi.org/10.3390/a16080395 - 21 Aug 2023
Viewed by 2613
Abstract
Industrial projects are plagued by uncertainties, often resulting in both time and cost overruns. This research introduces an innovative approach, employing Reinforcement Learning (RL), to address three distinct project management challenges within a setting of uncertain activity durations. The primary objective is to [...] Read more.
Industrial projects are plagued by uncertainties, often resulting in both time and cost overruns. This research introduces an innovative approach, employing Reinforcement Learning (RL), to address three distinct project management challenges within a setting of uncertain activity durations. The primary objective is to identify stable baseline schedules. The first challenge encompasses the multimode lean project management problem, wherein the goal is to maximize a project’s value function while adhering to both due date and budget chance constraints. The second challenge involves the chance-constrained critical chain buffer management problem in a multimode context. Here, the aim is to minimize the project delivery date while considering resource constraints and duration-chance constraints. The third challenge revolves around striking a balance between the project value and its net present value (NPV) within a resource-constrained multimode environment. To tackle these three challenges, we devised mathematical programming models, some of which were solved optimally. Additionally, we developed competitive RL-based algorithms and verified their performance against established benchmarks. Our RL algorithms consistently generated schedules that compared favorably with the benchmarks, leading to higher project values and NPVs and shorter schedules while staying within the stakeholders’ risk thresholds. The potential beneficiaries of this research are project managers and decision-makers who can use this approach to generate an efficient frontier of optimal project plans. Full article
(This article belongs to the Special Issue Self-Learning and Self-Adapting Algorithms in Machine Learning)
Show Figures

Figure 1

Figure 1
<p>Method flowchart.</p>
Full article ">Figure 2
<p>Project network diagram.</p>
Full article ">Figure 3
<p>LPM: Gantt chart of radar project plan. The arrows indicate predecessor activities.</p>
Full article ">Figure 4
<p>LPM: efficient frontier for radar project. Due date: 18 time periods; budget: USD 26,500.</p>
Full article ">Figure 5
<p>CCBM: Gantt chart for 90% on-time probability. The arrows indicate predecessor activities. The FBs and PBs appear in green, while the critical chain activities are highlighted in black.</p>
Full article ">Figure 6
<p>CCBM: Gantt chart for 95% on-time probability. The arrows indicate predecessor activities. The FBs and PBs appear in green, while the critical chain activities are highlighted in black.</p>
Full article ">Figure 7
<p>CCBM: Gantt chart for 100% on-time probability. The arrows indicate predecessor activities. The FBs and PBs appear in green, while the critical chain activities are highlighted in black.</p>
Full article ">Figure 8
<p>CCBM learning curves for RL<sub>1</sub> and RL<sub>2</sub>: 95% on-time probability.</p>
Full article ">Figure 9
<p>TVNPV: efficient frontier for radar project.</p>
Full article ">Figure 10
<p>NPV CDF plot.</p>
Full article ">Figure 11
<p>TVNPV: Gantt chart for a project with value = 76.62 and rNPV = 40,772. The arrows indicate predecessor activities.</p>
Full article ">Figure 12
<p>TVNPV learning curves for RL<sub>1</sub> and RL<sub>2</sub>: 95% rNPV probability, w<sub>1</sub> = w<sub>2</sub> = 0.5.</p>
Full article ">Figure 13
<p>(<b>a</b>) Box plot illustrating the runtime distribution of CS. The maximum runtime value corresponds to the 30-min time limit. (<b>b</b>) Box plot for CRL<sub>1</sub> runtime. The center line in each box represents the median for the runtimes. The bottom and top of the box show the 25th and 75th percentiles. The whiskers extend to the minimum and maximum runtime values, excluding outliers. The data points that fall beyond the whiskers are outliers. The top and bottom of the diamonds are a 95% confidence interval for the mean. The middle of each diamond is the sample average. The bracket outside of each box identifies the shortest half, which is the densest 50% of the runtimes.</p>
Full article ">
21 pages, 565 KiB  
Article
Bundle Enrichment Method for Nonsmooth Difference of Convex Programming Problems
by Manlio Gaudioso, Sona Taheri, Adil M. Bagirov and Napsu Karmitsa
Algorithms 2023, 16(8), 394; https://doi.org/10.3390/a16080394 - 21 Aug 2023
Viewed by 1330
Abstract
The Bundle Enrichment Method (BEM-DC) is introduced for solving nonsmooth difference of convex (DC) programming problems. The novelty of the method consists of the dynamic management of the bundle. More specifically, a DC model, being the difference of two convex piecewise [...] Read more.
The Bundle Enrichment Method (BEM-DC) is introduced for solving nonsmooth difference of convex (DC) programming problems. The novelty of the method consists of the dynamic management of the bundle. More specifically, a DC model, being the difference of two convex piecewise affine functions, is formulated. The (global) minimization of the model is tackled by solving a set of convex problems whose cardinality depends on the number of linearizations adopted to approximate the second DC component function. The new bundle management policy distributes the information coming from previous iterations to separately model the DC components of the objective function. Such a distribution is driven by the sign of linearization errors. If the displacement suggested by the model minimization provides no sufficient decrease of the objective function, then the temporary enrichment of the cutting plane approximation of just the first DC component function takes place until either the termination of the algorithm is certified or a sufficient decrease is achieved. The convergence of the BEM-DC method is studied, and computational results on a set of academic test problems with nonsmooth DC objective functions are provided. Full article
Show Figures

Figure 1

Figure 1
<p>Performance profiles using the number of function evaluations (20 starting points).</p>
Full article ">Figure 2
<p>Performance profiles using the number of subgradient evaluations (20 starting points).</p>
Full article ">Figure 3
<p>Performance profiles using CPU time (20 starting points).</p>
Full article ">
23 pages, 3701 KiB  
Article
A Comparative Study of Swarm Intelligence Metaheuristics in UKF-Based Neural Training Applied to the Identification and Control of Robotic Manipulator
by Juan F. Guerra, Ramon Garcia-Hernandez, Miguel A. Llama and Victor Santibañez
Algorithms 2023, 16(8), 393; https://doi.org/10.3390/a16080393 - 21 Aug 2023
Cited by 2 | Viewed by 1802
Abstract
This work presents a comprehensive comparative analysis of four prominent swarm intelligence (SI) optimization algorithms: Ant Lion Optimizer (ALO), Bat Algorithm (BA), Grey Wolf Optimizer (GWO), and Moth Flame Optimization (MFO). When compared under the same conditions with other SI algorithms, the Particle [...] Read more.
This work presents a comprehensive comparative analysis of four prominent swarm intelligence (SI) optimization algorithms: Ant Lion Optimizer (ALO), Bat Algorithm (BA), Grey Wolf Optimizer (GWO), and Moth Flame Optimization (MFO). When compared under the same conditions with other SI algorithms, the Particle Swarm Optimization (PSO) stands out. First, the Unscented Kalman Filter (UKF) parameters to be optimized are selected, and then each SI optimization algorithm is executed within an off-line simulation. Once the UKF initialization parameters P0, Q0, and R0 are obtained, they are applied in real-time in the decentralized neural block control (DNBC) scheme for the trajectory tracking task of a 2-DOF robot manipulator. Finally, the results are compared according to the criteria performance evaluation using each algorithm, along with CPU cost. Full article
(This article belongs to the Special Issue Bio-Inspired Algorithms)
Show Figures

Graphical abstract

Graphical abstract
Full article ">Figure 1
<p>Proposed methodology flowchart.</p>
Full article ">Figure 2
<p>UKF framework.</p>
Full article ">Figure 3
<p>Decentralized neural identification and control scheme with SI optimization approach.</p>
Full article ">Figure 4
<p>Diagram of the 2-DOF robot manipulator.</p>
Full article ">Figure 5
<p>Trajectory tracking position error link 1.</p>
Full article ">Figure 6
<p>Trajectory tracking position error link 2.</p>
Full article ">Figure 7
<p><math display="inline"><semantics> <msub> <mi mathvariant="script">L</mi> <mn>2</mn> </msub> </semantics></math>-norm for SI algorithms.</p>
Full article ">Figure 8
<p>Input torque link 1 with SI optimization. (<b>a</b>) Input torque link 1 ALO. (<b>b</b>) Input torque link 1 BA. (<b>c</b>) Input torque link 1 GWO. (<b>d</b>) Input torque link 1 MFO. (<b>e</b>) Input torque link 1 PSO.</p>
Full article ">Figure 9
<p>Input torque link 2 with SI optimization. (<b>a</b>) Input torque link 2 ALO. (<b>b</b>) Input torque link 2 BA. (<b>c</b>) Input torque link 2 GWO. (<b>d</b>) Input torque link 2 MFO. (<b>e</b>) Input torque link 2 PSO.</p>
Full article ">
19 pages, 2769 KiB  
Article
Testing a New “Decrypted” Algorithm for Plantower Sensors Measuring PM2.5: Comparison with an Alternative Algorithm
by Lance Wallace
Algorithms 2023, 16(8), 392; https://doi.org/10.3390/a16080392 - 17 Aug 2023
Cited by 1 | Viewed by 1412
Abstract
Recently, a hypothesis providing a detailed equation for the Plantower CF_1 algorithm for PM2.5 has been published. The hypothesis was originally validated using eight independent Plantower sensors in four PurpleAir PA-II monitors providing PM2.5 estimates from a single site in 2020. [...] Read more.
Recently, a hypothesis providing a detailed equation for the Plantower CF_1 algorithm for PM2.5 has been published. The hypothesis was originally validated using eight independent Plantower sensors in four PurpleAir PA-II monitors providing PM2.5 estimates from a single site in 2020. If true, the hypothesis makes important predictions regarding PM2.5 measurements using CF_1. Therefore, we test the hypothesis using 18 Plantower sensors from four datasets from two sites in later years (2021–2023). The four general models from these datasets agreed to within 10% with the original model. A competing algorithm known as “pm2.5 alt” has been published and is freely available on the PurpleAir API site. The accuracy, precision, and limit of detection for the two algorithms are compared. The CF_1 algorithm overestimates PM2.5 by about 60–70% compared to two calibrated PurpleAir monitors using the pm2.5 alt algorithm. A requirement that the two sensors in a single monitor agree to within 20% was met by 85–99% of the data using the pm2.5 alt algorithm, but by only 22–74% of the data using the CF_1 algorithm. The limit of detection (LOD) of the CF_1 algorithm was about 10 times the LOD of the pm2.5 alt algorithm, resulting in 71% of the CF_1 data falling below the LOD, compared to 1 % for the pm2.5 alt algorithm. Full article
(This article belongs to the Collection Feature Papers in Algorithms for Multidisciplinary Applications)
Show Figures

Graphical abstract

Graphical abstract
Full article ">Figure 1
<p>Contribution of each bin to total PM<sub>2.5</sub> during one year of monitoring indoor air PM<sub>2.5</sub> in a home. Bin midpoints are the geometrical mean of the bin boundaries.</p>
Full article ">Figure 2
<p>Relationship of the CF_1 algorithm to the “atmospheric environment” (CF_ATM) algorithm.</p>
Full article ">Figure 3
<p>PurpleAir (CF 3.24) estimates of particle source strength (mg/puff) compared to SidePak (CF 0.44). PurpleAir monitor IDs 1 and 2 (sensors 1a, 1b, 2a, 2b) were averaged for this comparison. SidePak values are means of triplicate SidePaks.</p>
Full article ">Figure 4
<p>Regression of individual model against measured PM<sub>2.5</sub> using the CF_1 algorithm. The R<sup>2</sup> was 0.9994.</p>
Full article ">Figure 5
<p>Regression of general model for the same Plantower sensor as in <a href="#algorithms-16-00392-f004" class="html-fig">Figure 4</a>. The R<sup>2</sup> was 0.9990.</p>
Full article ">Figure 6
<p>Regression of CF_1 estimates of PM<sub>2.5</sub> for sensor 1b vs. the calibrated pm2.5 alt estimate as the reference.</p>
Full article ">
15 pages, 5415 KiB  
Article
Using Epidemiological Models to Predict the Spread of Information on Twitter
by Matteo Castiello, Dajana Conte and Samira Iscaro
Algorithms 2023, 16(8), 391; https://doi.org/10.3390/a16080391 - 17 Aug 2023
Cited by 2 | Viewed by 1951
Abstract
In this article, we analyze the spread of information on social media (Twitter) and purpose a strategy based on epidemiological models. It is well known that social media represent a strong tool to spread news and, in particular, fake news, due to the [...] Read more.
In this article, we analyze the spread of information on social media (Twitter) and purpose a strategy based on epidemiological models. It is well known that social media represent a strong tool to spread news and, in particular, fake news, due to the fact that they are free and easy to use. First, we propose an algorithm to create a proper dataset in order to employ the ignorants–spreaders–recovered epidemiological model. Then, we show that to use this model to study the diffusion of real news, parameter estimation is required. We show that it is also possible to accurately predict the evolution of news spread and its peak in terms of the maximum number of people who share it and the time when the peak occurs trough a process of data reduction, i.e., by using only a part of the built dataset to optimize parameters. Numerical results based on the analysis of real news are also provided to confirm the applicability of our proposed model and strategy. Full article
(This article belongs to the Special Issue Mathematical Models and Their Applications IV)
Show Figures

Figure 1

Figure 1
<p>Graph of the ISR model.</p>
Full article ">Figure 2
<p>Graph of the IESZ model.</p>
Full article ">Figure 3
<p>Time evolution of the ISR model and IESZ model with parameters (<a href="#FD3-algorithms-16-00391" class="html-disp-formula">3</a>) and (<a href="#FD4-algorithms-16-00391" class="html-disp-formula">4</a>), respectively.</p>
Full article ">Figure 4
<p>Spreader prediction obtained using all data for parameter estimation. Red marker (∘): real number of spreaders. Black line: estimated number of spreaders. Blue marker (∘): maximum number of estimated spreaders. Black marker (∘): maximum number of real spreaders.</p>
Full article ">Figure 5
<p>Spreader prediction obtained using fewer data for parameter estimation. Green marker (<span style="color:#00FF00">*</span>): data used for the fitting phase. Red marker (∘): data used for model validation. Black line: estimated number of spreaders. Blue marker (∘): maximum number of estimated spreaders. Black marker (∘): maximum number of real spreaders.</p>
Full article ">
18 pages, 375 KiB  
Article
A Generalized Framework for the Estimation of Edge Infection Probabilities
by András Bóta and Lauren Gardner
Algorithms 2023, 16(8), 390; https://doi.org/10.3390/a16080390 - 16 Aug 2023
Viewed by 1170
Abstract
Modeling the spread of infections in networks is a well-studied and important field of research. Most infection and diffusion models require a real value or probability at the edges of the network as an input, but this is rarely available in real-life applications. [...] Read more.
Modeling the spread of infections in networks is a well-studied and important field of research. Most infection and diffusion models require a real value or probability at the edges of the network as an input, but this is rarely available in real-life applications. The Generalized Inverse Infection Model (GIIM) has previously been used in real-world applications to solve this problem. However, these applications were limited to the specifics of the corresponding case studies, and the theoretical properties, as well as the wider applicability of the model, are yet to be investigated. Here, we show that the general model works with the most widely used infection models and is able to handle an arbitrary number of observations on such processes. We evaluate the accuracy and speed of the GIIM on a large variety of realistic infection scenarios. Full article
Show Figures

Figure 1

Figure 1
<p>Example of underdetermination. There is only one edge weight that explains the infection event on (<b>a</b>), while (<b>b</b>) is underdetermined.</p>
Full article ">Figure 2
<p>Example of underdetermination. A leaf node has an observed infection value of one if and only if all the edges leading to it have edge infection values of one. A leaf node has an observed infection value of zero if at least one edge connecting the root to it has a value of zero.</p>
Full article ">Figure 3
<p>The RMSE at different distances from the source in the fully observed IC model for (<b>a</b>) the second DAG and (<b>b</b>) the second tree in <a href="#algorithms-16-00390-t001" class="html-table">Table 1</a>.</p>
Full article ">Figure 4
<p>RMSE at different time steps of the infection process for the fully observed scenario in the SIR model. The error is shown for observations at <span class="html-italic">T</span><math display="inline"><semantics> <mrow> <mo>:</mo> <mo>{</mo> <mn>1</mn> <mo>…</mo> <mn>10</mn> <mo>}</mo> </mrow> </semantics></math>.</p>
Full article ">Figure 5
<p>Scalability results for the two-observation infection scenarios on four graphs. Both binary and real-valued cases are shown. RMSE and ROC AUC values can be seen in (<b>a</b>,<b>b</b>), the average number of iterations is shown in (<b>c</b>,<b>d</b>), and the average total running time in minutes is shown in (<b>e</b>,<b>f</b>).</p>
Full article ">
20 pages, 1283 KiB  
Article
Systematic Analysis and Design of Control Systems Based on Lyapunov’s Direct Method
by Rick Voßwinkel and Klaus Röbenack
Algorithms 2023, 16(8), 389; https://doi.org/10.3390/a16080389 - 14 Aug 2023
Viewed by 1312
Abstract
This paper deals with systematic approaches for the analysis of stability properties and controller design for nonlinear dynamical systems. Numerical methods based on sum-of-squares decomposition or algebraic methods based on quantifier elimination are used. Starting from Lyapunov’s direct method, these methods can be [...] Read more.
This paper deals with systematic approaches for the analysis of stability properties and controller design for nonlinear dynamical systems. Numerical methods based on sum-of-squares decomposition or algebraic methods based on quantifier elimination are used. Starting from Lyapunov’s direct method, these methods can be used to derive conditions for the automatic verification of Lyapunov functions as well as for the structural determination of control laws. This contribution describes methods for the automatic verification of (control) Lyapunov functions as well as for the constructive determination of control laws. Full article
(This article belongs to the Special Issue Numerical Optimization and Algorithms)
Show Figures

Figure 1

Figure 1
<p>Relationship between the SOS program, the semidefinite program (SDP) and the MATLAB Toolbox SOSTOOLS [<a href="#B53-algorithms-16-00389" class="html-bibr">53</a>,<a href="#B54-algorithms-16-00389" class="html-bibr">54</a>].</p>
Full article ">Figure 2
<p>Furuta pendulum.</p>
Full article ">Figure 3
<p>Phase plane of the controlled system (<a href="#FD65-algorithms-16-00389" class="html-disp-formula">65</a>).</p>
Full article ">
21 pages, 1706 KiB  
Article
Decision Making under Conditions of Uncertainty and Risk in the Formation of Warehouse Stock of an Automotive Service Enterprise
by Irina Makarova, Polina Buyvol, Larisa Gabsalikhova, Eduard Belyaev and Eduard Mukhametdinov
Algorithms 2023, 16(8), 388; https://doi.org/10.3390/a16080388 - 13 Aug 2023
Viewed by 1595
Abstract
This article is devoted to the problem of determining the rational amount of spare parts in the warehouse of a service center of an automobile manufacturer’s branded network used for maintenance and current repairs. This problem was solved on the basis of the [...] Read more.
This article is devoted to the problem of determining the rational amount of spare parts in the warehouse of a service center of an automobile manufacturer’s branded network used for maintenance and current repairs. This problem was solved on the basis of the accumulated statistical data of failures that occurred during the warranty period of vehicle operation. In the calculation, game methods were used. This took into account the stochastic need for spare parts and the consequences of their presence or absence in stock, which are expressed in the form of a profit and an additional possible payment of a fine in case of a discrepancy between the current level of demand for spare parts and the available spare parts. Two cases of decision making are considered: under conditions of risk and uncertainty, the occurrence of which depends on the amount of information about the input flow of enters to the service center. If such statistics are accumulated, then the decision is made taking into account the possible risk associated with the uncertainty of a specific need for spare parts. Otherwise, the probability of a particular need is calculated on the basis of special criteria. To optimize the collection of information about the state of warehouse stocks, the transfer of information, and the assessment and forecasting of stocks, well-organized feedback is needed, which is shown in the form of an algorithm. Full article
(This article belongs to the Special Issue Optimization Algorithms in Logistics, Transportation, and SCM)
Show Figures

Figure 1

Figure 1
<p>Flow diagram (green arrows—saving raw data, blue arrows—storage exchange, purple arrows—processed data.</p>
Full article ">Figure 2
<p>Algorithm for managing the spare parts supply system.</p>
Full article ">Figure 3
<p>Dependence of the payoff on the strategy.</p>
Full article ">
26 pages, 18314 KiB  
Article
Model Predictive Evolutionary Temperature Control via Neural-Network-Based Digital Twins
by Cihan Ates, Dogan Bicat, Radoslav Yankov, Joel Arweiler, Rainer Koch and Hans-Jörg Bauer
Algorithms 2023, 16(8), 387; https://doi.org/10.3390/a16080387 - 12 Aug 2023
Cited by 1 | Viewed by 2371
Abstract
In this study, we propose a population-based, data-driven intelligent controller that leverages neural-network-based digital twins for hypothesis testing. Initially, a diverse set of control laws is generated using genetic programming with the digital twin of the system, facilitating a robust response to unknown [...] Read more.
In this study, we propose a population-based, data-driven intelligent controller that leverages neural-network-based digital twins for hypothesis testing. Initially, a diverse set of control laws is generated using genetic programming with the digital twin of the system, facilitating a robust response to unknown disturbances. During inference, the trained digital twin is utilized to virtually test alternative control actions for a multi-objective optimization task associated with each control action. Subsequently, the best policy is applied to the system. To evaluate the proposed model predictive control pipeline, experiments are conducted on a multi-mode heat transfer test rig. The objective is to achieve homogeneous cooling over the surface, minimizing the occurrence of hot spots and energy consumption. The measured variable vector comprises high dimensional infrared camera measurements arranged as a sequence (655,360 inputs), while the control variable includes power settings for fans responsible for convective cooling (3 outputs). Disturbances are induced by randomly altering the local heat loads. The findings reveal that by utilizing an evolutionary algorithm on measured data, a population of control laws can be effectively learned in the virtual space. This empowers the system to deliver robust performance. Significantly, the digital twin-assisted, population-based model predictive control (MPC) pipeline emerges as a superior approach compared to individual control models, especially when facing sudden and random changes in local heat loads. Leveraging the digital twin to virtually test alternative control policies leads to substantial improvements in the controller’s performance, even with limited training data. Full article
(This article belongs to the Special Issue Bio-Inspired Algorithms)
Show Figures

Figure 1

Figure 1
<p>The physical setup is devised as a multi-mode cooling problem, depicted in the upper section. The arrangement of fans around the copper plate is illustrated in the lower left corner, while the configuration of heating strips at the back of the plate, along with randomly placed thermal insulators, is shown in the lower right corner.</p>
Full article ">Figure 2
<p>Visualization of two experiments from the dataset.</p>
Full article ">Figure 3
<p>Evolution of consecutive frames over the course of an experiment. (<b>Left</b>): Mean pixel value change compared to the first steady-state condition. (<b>Right</b>): The percentage of pixels with a deviation larger than 3%.</p>
Full article ">Figure 4
<p>Deployed digital twin model architecture. (<b>a</b>) The next sequence predictor architecture with input and output sequence length of two. The fan settings vector is appended to the output of the first dense layer. (<b>b</b>) A detailed view of the encoder architecture. The input sequence is compressed to a latent state representation through 7 convolutional layers with (16, 32, 64, 64, 128, 128, 256) channels, respectively. (<b>c</b>) A detailed view of the decoder. The output of the second dense layer is reshaped into a <math display="inline"><semantics><mrow><mn>2</mn><mo>×</mo><mn>4</mn><mo>×</mo><mn>5</mn><mo>×</mo><mn>256</mn></mrow></semantics></math> tensor. The reconstruction is conducted through 7 consecutive deconvolutional layers with (256, 128, 64, 32, 16, 8, 1) channels, respectively.</p>
Full article ">Figure 5
<p>Examples of successful digital twin predictions. GT refers to the ground truth (i.e., experiments). (<b>a</b>) Fans [0, 40, 60]; Heating Strips [75, 0, 25]. (<b>b</b>) Fans [0, 40, 40]; Heating Strips [75, 100, 100]. (<b>c</b>) Fans [60, 80, 100]; Heating Strips [75, 75, 100].</p>
Full article ">Figure 6
<p>Digital twin predictions missing the hot spot formations. GT refers to the ground truth (i.e., experiments). (<b>a</b>) Fans [60, 20, 20]; Heating Strips [25, 100, 25]. (<b>b</b>) Fans [80, 0, 40]; Heating Strips [100, 75, 75].</p>
Full article ">Figure 7
<p>Capabilities of the digital twin model for extrapolation of the fan settings. (<b>a</b>) Prediction: Fans [0, 40, 60]; Fans on [100, 100, 100]. (<b>b</b>) Prediction: Fans [0, 40, 40]; Fans on [100, 100, 100]. (<b>c</b>) Prediction: Fans [60, 20, 20]; Fans off [0, 0, 0]. (<b>d</b>) Prediction: Fans [80, 0, 40]; Fans off [0, 0, 0].</p>
Full article ">Figure 8
<p>From left to right—Evolution of the temperature field during the experiment: Specialist (<b>top</b> row), General (<b>middle</b> row) and Random Control (<b>bottom</b> row).</p>
Full article ">Figure 9
<p>Performance metrics of MPC with 10 individuals at high thermal loads. The x-axis denotes the time, while the y-axis shows the metric.</p>
Full article ">Figure 10
<p>From left to right—Evolution of the temperature field during the experiment: Specialist (<b>top</b> row), General (<b>middle</b> row) and Random Control (<b>bottom</b> row).</p>
Full article ">Figure 11
<p>Performance metrics of MPC with 10 individuals at medium thermal loads. The x-axis denotes the time, while the y-axis shows the metric.</p>
Full article ">Figure 12
<p>From left to right—Evolution of the temperature field during the experiment: Specialist (<b>top</b> row), General (<b>middle</b> row) and Random Control (<b>bottom</b> row).</p>
Full article ">Figure 13
<p>Performance metrics of MPC with 10 individuals at low thermal loads. The x-axis denotes the time, while the y-axis shows the metric.</p>
Full article ">Figure A1
<p>The training pipeline for the GP controller.</p>
Full article ">Figure A2
<p>Experimental protocol for MPC. (<b>a</b>) Experiment pipeline with a single individual. (<b>b</b>) Experiment pipeline with population-based MPC.</p>
Full article ">Figure A2 Cont.
<p>Experimental protocol for MPC. (<b>a</b>) Experiment pipeline with a single individual. (<b>b</b>) Experiment pipeline with population-based MPC.</p>
Full article ">Figure A3
<p>Standardized protocol for the Performance Evaluation Experiments.</p>
Full article ">Figure A4
<p>Performance metrics of MPC with 1 individual at high thermal loads. The x-axis denotes the time, while the y-axis shows the metric.</p>
Full article ">Figure A5
<p>Performance metrics of MPC with 1 individual at medium thermal loads. The x-axis denotes the time, while the y-axis shows the metric.</p>
Full article ">Figure A6
<p>Performance metrics of MPC with 1 individual at low thermal loads. The x-axis denotes the time, while the y-axis shows the metric.</p>
Full article ">
16 pages, 3314 KiB  
Article
Reducing Nervousness in Master Production Planning: A Systematic Approach Incorporating Product-Driven Strategies
by Patricio Sáez, Carlos Herrera and Victor Parada
Algorithms 2023, 16(8), 386; https://doi.org/10.3390/a16080386 - 11 Aug 2023
Cited by 1 | Viewed by 1613
Abstract
Manufacturing companies face a significant challenge when developing their master production schedule, navigating unforeseen disruptions during daily operations. Moreover, fluctuations in demand pose a substantial risk to scheduling and are the main cause of instability and uncertainty in the system. To address these [...] Read more.
Manufacturing companies face a significant challenge when developing their master production schedule, navigating unforeseen disruptions during daily operations. Moreover, fluctuations in demand pose a substantial risk to scheduling and are the main cause of instability and uncertainty in the system. To address these challenges, employing flexible systems to mitigate uncertainty without incurring additional costs and generate sustainable responses in industrial applications is crucial. This paper proposes a product-driven system to complement the master production plan generated by a mathematical model. This system incorporates intelligent agents that make production decisions with a function capable of reducing uncertainty without significantly increasing production costs. The agents modify or determine the forecasted production quantities for each cycle or period. In the case study conducted, a master production plan was established for 12 products over a one-year time horizon. The proposed solution achieved an 11.42% reduction in uncertainty, albeit with a 2.39% cost increase. Full article
(This article belongs to the Special Issue Scheduling Theory and Algorithms for Sustainable Manufacturing)
Show Figures

Figure 1

Figure 1
<p>Model characterization matrix.</p>
Full article ">Figure 2
<p>Diagram of communication between intelligent products.</p>
Full article ">Figure 3
<p>Sequence diagram for the model.</p>
Full article ">Figure 4
<p>Simulation dynamics and product agent communication.</p>
Full article ">Figure 5
<p>Class diagram for proposed model.</p>
Full article ">Figure 6
<p>Cost and sensitivity analysis (<b>a</b>) Analysis of the model based on control by period. (<b>b</b>) Model analysis based on control per cycle. (<b>c</b>) Model analysis based on control by period–simultaneous cycle.</p>
Full article ">Figure 6 Cont.
<p>Cost and sensitivity analysis (<b>a</b>) Analysis of the model based on control by period. (<b>b</b>) Model analysis based on control per cycle. (<b>c</b>) Model analysis based on control by period–simultaneous cycle.</p>
Full article ">Figure 7
<p>(<b>a</b>) Analysis of Φ in a model based on control by period. (<b>b</b>) Analysis of Φ in a model based on control per cycle. (<b>c</b>) Analysis of Φ in a model based on period–cycle control.</p>
Full article ">Figure 7 Cont.
<p>(<b>a</b>) Analysis of Φ in a model based on control by period. (<b>b</b>) Analysis of Φ in a model based on control per cycle. (<b>c</b>) Analysis of Φ in a model based on period–cycle control.</p>
Full article ">
14 pages, 559 KiB  
Article
Constant-Beamwidth LCMV Beamformer with Rectangular Arrays
by Vitor Probst Curtarelli and Israel Cohen
Algorithms 2023, 16(8), 385; https://doi.org/10.3390/a16080385 - 10 Aug 2023
Cited by 2 | Viewed by 1596
Abstract
This paper presents a novel approach utilizing uniform rectangular arrays to design a constant-beamwidth (CB) linearly constrained minimum variance (LCMV) beamformer, which also improves white noise gain and directivity. By employing a generalization of the convolutional Kronecker product beamforming technique, we decompose a [...] Read more.
This paper presents a novel approach utilizing uniform rectangular arrays to design a constant-beamwidth (CB) linearly constrained minimum variance (LCMV) beamformer, which also improves white noise gain and directivity. By employing a generalization of the convolutional Kronecker product beamforming technique, we decompose a physical array into virtual subarrays, each tailored to achieve a specific desired feature, and we subsequently synthesize the original array’s beamformer. Through simulations, we demonstrate that the proposed approach successfully achieves the desired beamforming characteristics while maintaining favorable levels of white noise gain and directivity. A comparative analysis against existing methods from the literature reveals that the proposed method performs better than the existing methods. Full article
(This article belongs to the Special Issue Digital Signal Processing Algorithms and Applications)
Show Figures

Figure 1

Figure 1
<p>Beampattern heatmap for all situations in <a href="#algorithms-16-00385-t001" class="html-table">Table 1</a>. <math display="inline"><semantics><mi mathvariant="sans-serif">x</mi></semantics></math>-axis is direction of source (in <math display="inline"><semantics><msup><mrow/><mi mathvariant="normal">o</mi></msup></semantics></math>), and <math display="inline"><semantics><mi mathvariant="sans-serif">y</mi></semantics></math>-axis is the frequency (in kHz).</p>
Full article ">Figure 2
<p>(<b>a</b>) FNBW, (<b>b</b>) WNG, and (<b>c</b>) DF for the beamformers designed with the parameters in <a href="#algorithms-16-00385-t001" class="html-table">Table 1</a>.</p>
Full article ">
20 pages, 1198 KiB  
Article
Reinforcement Learning Derived High-Alpha Aerobatic Manoeuvres for Fixed Wing Operation in Confined Spaces
by Robert Clarke, Liam Fletcher, Sebastian East and Thomas Richardson
Algorithms 2023, 16(8), 384; https://doi.org/10.3390/a16080384 - 10 Aug 2023
Cited by 2 | Viewed by 1517
Abstract
Reinforcement learning has been used on a variety of control tasks for drones, including, in previous work at the University of Bristol, on perching manoeuvres with sweep-wing aircraft. In this paper, a new aircraft model is presented representing flight up to very high [...] Read more.
Reinforcement learning has been used on a variety of control tasks for drones, including, in previous work at the University of Bristol, on perching manoeuvres with sweep-wing aircraft. In this paper, a new aircraft model is presented representing flight up to very high angles of attack where the aerodynamic models are highly nonlinear. The model is employed to develop high-alpha manoeuvres, using reinforcement learning to exploit the nonlinearities at the edge of the flight envelope, enabling fixed-wing operations in tightly confined spaces. Training networks for multiple manoeuvres is also demonstrated. The approach is shown to generate controllers that take full advantage of the aircraft capability. It is suggested that a combination of these neural network-based controllers, together with classical model predictive control, could be used to operate efficiently within the low alpha flight regime and, yet, respond rapidly in confined spaces where high alpha, agile manoeuvres are required. Full article
(This article belongs to the Special Issue Advancements in Reinforcement Learning Algorithms)
Show Figures

Figure 1

Figure 1
<p>Diagram showing definitions of pitch angle, <math display="inline"><semantics><mi>θ</mi></semantics></math>, angle of attack, <math display="inline"><semantics><mi>α</mi></semantics></math>, flight path angle, <math display="inline"><semantics><mi>γ</mi></semantics></math>, and elevator angle, <math display="inline"><semantics><mi>η</mi></semantics></math>.</p>
Full article ">Figure 2
<p>Images of the MXS2 airframe in the University of Bristol Wind Tunnel and in free flight at the University of Bristol Fenswood free flight facility.</p>
Full article ">Figure 3
<p>Plots of the lift and pitching moment coefficient curves used in the MXS model across the full range of <math display="inline"><semantics><mi>α</mi></semantics></math>.</p>
Full article ">Figure 4
<p>Diagram showing a hypothetical looping exit from a vertical dive.</p>
Full article ">Figure 5
<p>Run A: Simulation results showing Reinforcement Learning-based Descent Response.</p>
Full article ">Figure 6
<p>Run B: Simulation results showing the Descent Response With Waypoints.</p>
Full article ">Figure 7
<p>Run C: Simulation results showing the transition into the Hover.</p>
Full article ">Figure 8
<p>Run D: Simulation results showing the Turn-around Manoeuvre.</p>
Full article ">Figure 9
<p>Run E: Simulation results showing the Climb manoeuvre response.</p>
Full article ">Figure 10
<p>Run F: Simulation results showing the Multiple Manoeuvres from a Single Agent.</p>
Full article ">Figure 11
<p>Run G: Simulation demonstrating Multi-manoeuvre Agent with noise.</p>
Full article ">Figure 12
<p>Run G: multi-manoeuvre with noise sequentially evaluated output. Shown with representative obstacles.</p>
Full article ">
11 pages, 775 KiB  
Article
A Neural-Network-Based Competition between Short-Lived Particle Candidates in the CBM Experiment at FAIR
by Artemiy Belousov, Ivan Kisel and Robin Lakos
Algorithms 2023, 16(8), 383; https://doi.org/10.3390/a16080383 - 9 Aug 2023
Viewed by 1429
Abstract
Fast and efficient algorithms optimized for high performance computers are crucial for the real-time analysis of data in heavy-ion physics experiments. Furthermore, the application of neural networks and other machine learning techniques has become more popular in physics experiments over the last years. [...] Read more.
Fast and efficient algorithms optimized for high performance computers are crucial for the real-time analysis of data in heavy-ion physics experiments. Furthermore, the application of neural networks and other machine learning techniques has become more popular in physics experiments over the last years. For that reason, a fast neural network package called ANN4FLES is developed in C++, which will be optimized to be used on a high performance computer farm for the future Compressed Baryonic Matter (CBM) experiment at the Facility for Antiproton and Ion Research (FAIR, Darmstadt, Germany). This paper describes the first application of ANN4FLES used in the reconstruction chain of the CBM experiment to replace the existing particle competition between Ks-mesons and Λ-hyperons in the KF Particle Finder by a neural network based approach. The raw classification performance of the neural network reaches over 98% on the testing set. Furthermore, it is shown that the background noise was reduced by the neural network-based competition and therefore improved the quality of the physics analysis. Full article
(This article belongs to the Special Issue 2022 and 2023 Selected Papers from Algorithms Editorial Board Members)
Show Figures

Figure 1

Figure 1
<p>Multi-Layer Perceptron (MLP) topology used to classify <math display="inline"><semantics><msub><mi>K</mi><mi>s</mi></msub></semantics></math> and <math display="inline"><semantics><mi mathvariant="normal">Λ</mi></semantics></math>, using 3 hidden layers with 8 neurons each, hidden activation function Leaky-ReLU. Output layer consists of two neurons with Softmax activation and cross entropy loss.</p>
Full article ">Figure 2
<p>ANN4FLES and PyTorch accuracy for training and testing, using reconstructed mass and PDG mass over 100 epochs with a peak performance of 98.6% in the testing set. Both networks, ANN4FLES and PyTorch, achieved high accuracy values on the testing set.</p>
Full article ">Figure 3
<p>Histograms of mass spectra for <math display="inline"><semantics><msub><mi>K</mi><mi>s</mi></msub></semantics></math> (<b>left</b>) and <math display="inline"><semantics><mi mathvariant="normal">Λ</mi></semantics></math> (<b>right</b>). Comparison of no competition (black), the existing mother particle competition (green) and the competition by ANN4FLES (red).</p>
Full article ">Figure 4
<p>Histograms of signals for <math display="inline"><semantics><msub><mi>K</mi><mi>s</mi></msub></semantics></math> (<b>left</b>) and <math display="inline"><semantics><mi mathvariant="normal">Λ</mi></semantics></math> (<b>right</b>) masses. Comparison of no competition (black), the existing mother particle competition (green) and ANN4FLES (red).</p>
Full article ">Figure 5
<p>Histograms of background for <math display="inline"><semantics><msub><mi>K</mi><mi>s</mi></msub></semantics></math> (<b>left</b>) and <math display="inline"><semantics><mi mathvariant="normal">Λ</mi></semantics></math> (<b>right</b>) masses. Comparison of no competition (black), the existing mother particle competition (green) and ANN4FLES (red).</p>
Full article ">Figure 6
<p>Histograms of ghosts for <math display="inline"><semantics><msub><mi>K</mi><mi>s</mi></msub></semantics></math> (<b>left</b>) and <math display="inline"><semantics><mi mathvariant="normal">Λ</mi></semantics></math> (<b>right</b>) masses. Comparison of no competition (black), the existing mother particle competition (green) and ANN4FLES (red).</p>
Full article ">Figure 7
<p>Invariant mass distributions of <math display="inline"><semantics><mrow><msub><mi>K</mi><mi>s</mi></msub><mo>=</mo><msup><mi>π</mi><mo>+</mo></msup><msup><mi>π</mi><mo>−</mo></msup></mrow></semantics></math> and <math display="inline"><semantics><mrow><mi mathvariant="normal">Λ</mi><mo>=</mo><mi mathvariant="normal">p</mi><msup><mi>π</mi><mo>−</mo></msup></mrow></semantics></math> for the existing competition, including signal–background ratio and significance.</p>
Full article ">Figure 8
<p>Invariant mass distributions of <math display="inline"><semantics><mrow><msub><mi>K</mi><mi>s</mi></msub><mo>=</mo><msup><mi>π</mi><mo>+</mo></msup><msup><mi>π</mi><mo>−</mo></msup></mrow></semantics></math> and <math display="inline"><semantics><mrow><mi mathvariant="normal">Λ</mi><mo>=</mo><mi mathvariant="normal">p</mi><msup><mi>π</mi><mo>−</mo></msup></mrow></semantics></math>, including signal–background ratio and significance for the ANN4FLES approach.</p>
Full article ">
19 pages, 10277 KiB  
Article
Learning to Extrapolate Using Continued Fractions: Predicting the Critical Temperature of Superconductor Materials
by Pablo Moscato, Mohammad Nazmul Haque, Kevin Huang, Julia Sloan and Jonathon Corrales de Oliveira
Algorithms 2023, 16(8), 382; https://doi.org/10.3390/a16080382 - 8 Aug 2023
Cited by 4 | Viewed by 2393
Abstract
In the field of Artificial Intelligence (AI) and Machine Learning (ML), a common objective is the approximation of unknown target functions y=f(x) using limited instances S=(x(i),y(i)) [...] Read more.
In the field of Artificial Intelligence (AI) and Machine Learning (ML), a common objective is the approximation of unknown target functions y=f(x) using limited instances S=(x(i),y(i)), where x(i)D and D represents the domain of interest. We refer to S as the training set and aim to identify a low-complexity mathematical model that can effectively approximate this target function for new instances x. Consequently, the model’s generalization ability is evaluated on a separate set T={x(j)}D, where TS, frequently with TS=, to assess its performance beyond the training set. However, certain applications require accurate approximation not only within the original domain D but in an extended domain D that encompasses D as well. This becomes particularly relevant in scenarios involving the design of new structures, where minimizing errors in approximations is crucial. For example, when developing new materials through data-driven approaches, the AI/ML system can provide valuable insights to guide the design process by serving as a surrogate function. Consequently, the learned model can be employed to facilitate the design of new laboratory experiments. In this paper, we propose a method for multivariate regression based on iterative fitting of a continued fraction, incorporating additive spline models. We compare the performance of our method with established techniques, including AdaBoost, Kernel Ridge, Linear Regression, Lasso Lars, Linear Support Vector Regression, Multi-Layer Perceptrons, Random Forest, Stochastic Gradient Descent, and XGBoost. To evaluate these methods, we focus on an important problem in the field, namely, predicting the critical temperature of superconductors based on their physical–chemical characteristics. Full article
(This article belongs to the Special Issue Machine Learning Algorithms and Methods for Predictive Analytics)
Show Figures

Figure 1

Figure 1
<p>Examples of the fit obtained by the <span class="html-italic">Spline Continued Fraction</span> using a dataset generated thanks to the gamma function with added noise. We present several continued fractions with depths of 3 (<b>a</b>), 5 (<b>b</b>), 10 (<b>c</b>), and 15 (<b>d</b>). In this example, the number of knots <span class="html-italic">k</span> was chosen to be 3, <math display="inline"><semantics><mrow><mi>n</mi><mi>o</mi><mi>r</mi><mi>m</mi></mrow></semantics></math> = 1, and <math display="inline"><semantics><mi>λ</mi></semantics></math> = 0.1.</p>
Full article ">Figure 2
<p>Statistical comparison of the regressors for the <span class="html-italic">Out-of-Sample</span> test: (<b>a</b>) heat map showing the significance levels of the <span class="html-italic">p</span>-values obtained by the Friedman post hoc test and (<b>b</b>) critical difference (CD) plot showing the statistical significance of the rankings achieved by the different regression methods.</p>
Full article ">Figure 3
<p>Statistical comparison of the regressors for the <span class="html-italic">Out-of-Domain</span> test: (<b>a</b>) heat map showing the significance levels of the <span class="html-italic">p</span>-values obtained by the Friedman post hoc test and (<b>b</b>) critical difference (CD) plot showing the statistical significance of the rankings achieved by the different regression methods.</p>
Full article ">Figure 4
<p>Runtime (in seconds) required for model building and prediction by the regressors for 100 runs of the <span class="html-italic">Out-of-Domain</span> test, in which samples with the lowest 90% of critical temperatures were drawn as the training data and an equal number of samples drawn from the top 10% highest critical temperatures constituted the test data.</p>
Full article ">Figure 5
<p><span class="html-italic">Out-of-Sample</span> test results, showing the predicted vs. actual temperatures for the entire dataset with regression models trained on the training data: (<b>a</b>) <span class="html-italic">Linear Regression</span> (replicating the outcome from Hamidieh), (<b>b</b>) <span class="html-italic">XGBoost</span>, and (<b>c</b>) <span class="html-italic">Spline Continued Fraction</span>.</p>
Full article ">Figure 6
<p><span class="html-italic">Out-of-Domain</span> test results, showing the predicted vs. actual temperatures of the samples for the highest 10% of critical temperatures, where the models were fitted using the samples with the lowest 90% critical temperatures. The <span class="html-italic">x</span>-axis values up to 145 K are shown, leaving one extreme value (185 K) outside of the visualized area. Results of the <span class="html-italic">Out-of-Domain</span> test for: (<b>a</b>) <span class="html-italic">Linear Regression</span>, with an <span class="html-italic">RMSE</span> of 41.3; (<b>b</b>) <span class="html-italic">XGBoost</span>, with an <span class="html-italic">RMSE</span> of 36.3; and (<b>c</b>) <span class="html-italic">Spline Continued Fraction</span>, with an <span class="html-italic">RMSE</span> of 34.8.</p>
Full article ">Figure 7
<p>Critical difference (CD) plot showing the statistical significance of rankings achieved by the regression methods for 100 runs on the six datasets form [<a href="#B8-algorithms-16-00382" class="html-bibr">8</a>].</p>
Full article ">
23 pages, 4398 KiB  
Review
Investigating Routing in the VANET Network: Review and Classification of Approaches
by Arun Kumar Sangaiah, Amir Javadpour, Chung-Chian Hsu, Anandakumar Haldorai and Ahmad Zeynivand
Algorithms 2023, 16(8), 381; https://doi.org/10.3390/a16080381 - 7 Aug 2023
Cited by 12 | Viewed by 2747
Abstract
Vehicular Ad Hoc Network (VANETs) need methods to control traffic caused by a high volume of traffic during day and night, the interaction of vehicles, and pedestrians, vehicle collisions, increasing travel delays, and energy issues. Routing is one of the most critical problems [...] Read more.
Vehicular Ad Hoc Network (VANETs) need methods to control traffic caused by a high volume of traffic during day and night, the interaction of vehicles, and pedestrians, vehicle collisions, increasing travel delays, and energy issues. Routing is one of the most critical problems in VANET. One of the machine learning categories is reinforcement learning (RL), which uses RL algorithms to find a more optimal path. According to the feedback they get from the environment, these methods can affect the system through learning from previous actions and reactions. This paper provides a comprehensive review of various methods such as reinforcement learning, deep reinforcement learning, and fuzzy learning in the traffic network, to obtain the best method for finding optimal routing in the VANET network. In fact, this paper deals with the advantages, disadvantages and performance of the methods introduced. Finally, we categorize the investigated methods and suggest the proper performance of each of them. Full article
(This article belongs to the Collection Featured Reviews of Algorithms)
Show Figures

Figure 1

Figure 1
<p>Classification of Routing Protocols.</p>
Full article ">Figure 2
<p>Routing in VANET network.</p>
Full article ">Figure 3
<p>Machine learning.</p>
Full article ">Figure 4
<p>Finding stochastic policies.</p>
Full article ">Figure 5
<p>Artificial intelligence.</p>
Full article ">Figure 6
<p>Fuzzy Logic.</p>
Full article ">Figure 7
<p>Schematic of reinforcement learning.</p>
Full article ">Figure 8
<p>Visualization with node graph.</p>
Full article ">Figure 9
<p>Action-value function description.</p>
Full article ">Figure 10
<p>Visualization with node graph.</p>
Full article ">Figure 11
<p>Drawing tree with node graph.</p>
Full article ">
25 pages, 16908 KiB  
Article
Design Optimization of Truss Structures Using a Graph Neural Network-Based Surrogate Model
by Navid Nourian, Mamdouh El-Badry and Maziar Jamshidi
Algorithms 2023, 16(8), 380; https://doi.org/10.3390/a16080380 - 7 Aug 2023
Cited by 6 | Viewed by 4277
Abstract
One of the primary objectives of truss structure design optimization is to minimize the total weight by determining the optimal sizes of the truss members while ensuring structural stability and integrity against external loads. Trusses consist of pin joints connected by straight members, [...] Read more.
One of the primary objectives of truss structure design optimization is to minimize the total weight by determining the optimal sizes of the truss members while ensuring structural stability and integrity against external loads. Trusses consist of pin joints connected by straight members, analogous to vertices and edges in a mathematical graph. This characteristic motivates the idea of representing truss joints and members as graph vertices and edges. In this study, a Graph Neural Network (GNN) is employed to exploit the benefits of graph representation and develop a GNN-based surrogate model integrated with a Particle Swarm Optimization (PSO) algorithm to approximate nodal displacements of trusses during the design optimization process. This approach enables the determination of the optimal cross-sectional areas of the truss members with fewer finite element model (FEM) analyses. The validity and effectiveness of the GNN-based optimization technique are assessed by comparing its results with those of a conventional FEM-based design optimization of three truss structures: a 10-bar planar truss, a 72-bar space truss, and a 200-bar planar truss. The results demonstrate the superiority of the GNN-based optimization, which can achieve the optimal solutions without violating constraints and at a faster rate, particularly for complex truss structures like the 200-bar planar truss problem. Full article
(This article belongs to the Special Issue Deep Neural Networks and Optimization Algorithms)
Show Figures

Figure 1

Figure 1
<p>Flowchart illustrating the GNN-based truss size optimization.</p>
Full article ">Figure 2
<p>Directed and undirected edges.</p>
Full article ">Figure 3
<p>A typical GNN model.</p>
Full article ">Figure 4
<p>Encode-Process-Decode architecture.</p>
Full article ">Figure 5
<p>Ten-bar planar truss.</p>
Full article ">Figure 6
<p>Graph representation of the 10-bar planar truss.</p>
Full article ">Figure 7
<p>(<b>a</b>) Convergence history of the loss function for five-fold validation model; and (<b>b</b>) convergence history of the metric function for five-fold validation model.</p>
Full article ">Figure 8
<p>Convergence history of the loss function for the trained surrogate model.</p>
Full article ">Figure 9
<p>Seventy-two-bar space truss.</p>
Full article ">Figure 10
<p>Graph representation of the 72-bar space truss.</p>
Full article ">Figure 11
<p>(<b>a</b>) Convergence history of the loss function for five-fold validation model; and (<b>b</b>) convergence history of the metric function for five-fold validation model.</p>
Full article ">Figure 12
<p>Convergence history of the loss function for the trained surrogate model.</p>
Full article ">Figure 13
<p>The 200-bar planar truss.</p>
Full article ">Figure 14
<p>Graph representation of the 200-bar planar truss.</p>
Full article ">Figure 15
<p>(<b>a</b>) Convergence history of the loss function for five-fold validation model; and (<b>b</b>) convergence history of the metric function for five-fold validation model.</p>
Full article ">Figure 16
<p>Convergence history of the loss function for the trained surrogate model.</p>
Full article ">Figure 17
<p>Optimization process time for the GNN-based and FEM-based techniques.</p>
Full article ">
27 pages, 10487 KiB  
Article
A Multi-Objective Tri-Level Algorithm for Hub-and-Spoke Network in Short Sea Shipping Transportation
by Panagiotis Farmakis, Athanasios Chassiakos and Stylianos Karatzas
Algorithms 2023, 16(8), 379; https://doi.org/10.3390/a16080379 - 7 Aug 2023
Viewed by 2154
Abstract
Hub-and-Spoke (H&S) network modeling is a form of transport topology optimization in which network joins are connected through intermediate hub nodes. The Short Sea Shipping (SSS) problem aims to efficiently disperse passenger flows involving multiple vessel routes and intermediary hubs through which passengers [...] Read more.
Hub-and-Spoke (H&S) network modeling is a form of transport topology optimization in which network joins are connected through intermediate hub nodes. The Short Sea Shipping (SSS) problem aims to efficiently disperse passenger flows involving multiple vessel routes and intermediary hubs through which passengers are transferred to their final destination. The problem contains elements of the Hub-and-Spoke and Travelling Salesman, with different levels of passenger flows among islands, making it more demanding than the typical H&S one, as the hub selection within nodes and the shortest routes among islands are internal optimization goals. This work introduces a multi-objective tri-level optimization algorithm for the General Network of Short Sea Shipping (GNSSS) problem to reduce travel distances and transportation costs while improving travel quality and user satisfaction, mainly by minimizing passenger hours spent on board. The analysis is performed at three levels of decisions: (a) the hub node assignment, (b) the island-to-line assignment, and (c) the island service sequence within each line. Due to the magnitude and complexity of the problem, a genetic algorithm is employed for the implementation. The algorithm performance has been tested and evaluated through several real and simulated case studies of different sizes and operational scenarios. The results indicate that the algorithm provides rational solutions in accordance with the desired sub-objectives. The multi-objective consideration leads to solutions that are quite scattered in the solution space, indicating the necessity of employing formal optimization methods. Typical Pareto diagrams present non-dominated solutions varying at a range of 30 percent in terms of the total distance traveled and more than 50 percent in relation to the cumulative passenger hours. Evaluation results further indicate satisfactory algorithm performance in terms of result stability (repeatability) and computational time requirements. In conclusion, the work provides a tool for assisting network operation and transport planning decisions by shipping companies in the directions of cost reduction and traveler service upgrade. In addition, the model can be adapted to other applications in transportation and in the supply chain. Full article
(This article belongs to the Special Issue Optimization Algorithms for Decision Support Systems)
Show Figures

Graphical abstract

Graphical abstract
Full article ">Figure 1
<p>(<b>a</b>) Conventional H&amp;S structure, (<b>b</b>) Short Sea Shipping transportation H&amp;S structure.</p>
Full article ">Figure 2
<p>Tensor representation of the problem solution: (<b>a</b>) 3D structure, (<b>b</b>) 2D structure.</p>
Full article ">Figure 3
<p>Chromosome representation and solution structure.</p>
Full article ">Figure 4
<p>Permutation matrices of the problem structure.</p>
Full article ">Figure 5
<p>Optimization model structure for short-sea passenger transport.</p>
Full article ">Figure 6
<p>Optimization methodology flowchart.</p>
Full article ">Figure 7
<p>Traveler flows to the Aegean Islands.</p>
Full article ">Figure 8
<p>Optimization results for case study C1 (single vessel scenario). (<b>a</b>) C1a: D = 645 nm, T = 26:13 h, PH = 21,574 h, T<sub>max-trip</sub> = 26:13 h. (<b>b</b>) C1b: D = 705 nm, T = 28:26 h, PH = 17,032 h, T<sub>max-trip</sub> = 28:26 h. (<b>c</b>) C1c: D = 684 nm, T = 27:40 h, PH = 17,121 h, T<sub>max-trip</sub> = 27:40 h.</p>
Full article ">Figure 9
<p>Optimization results for case study C2 (two vessels from central ports) (the colours in the numbers below correspond to those of the lines in the maps). (<b>a</b>) C2a: <span style="color:#C00000">D<sub>1</sub></span>/<span style="color:green">D<sub>2</sub></span>/D<sub>tot</sub> = <span style="color:#C00000">315</span>/<span style="color:green">339</span>/654 nm, <span style="color:#C00000">T<sub>1</sub></span>/<span style="color:green">T<sub>2</sub></span>/T<sub>tot</sub> = <span style="color:#C00000">13:00</span>/<span style="color:green">13:23</span>/<span style="color:#000099">26:23 h, </span>PH = 12,265 h, T<sub>max-trip</sub> = 13:23 h. (<b>b</b>) C2b: <span style="color:#C00000">D<sub>1</sub></span>/<span style="color:green">D<sub>2</sub></span>/D<sub>tot</sub> =<span style="color:#C00000"> 370</span>/<span style="color:green">421</span>/<span style="color:#000099">791</span><span style="color:#000099"> nm</span>, <span style="color:#C00000">T<sub>1</sub></span>/<span style="color:green">T<sub>2</sub></span>/T<sub>tot</sub> = <span style="color:#C00000">14:52</span>/<span style="color:green">16:35</span>/<span style="color:#000099">31:27 h</span>, PH = 10,369 h, T<sub>max-trip</sub> = 16:35 h. (<b>c</b>) C2c:<span style="color:#C00000">D</span><sub><span style="color:#C00000">1</span></sub>/<span style="color:green">D<sub>2</sub></span>/D<sub>tot</sub> =<span style="color:#C00000"> 427</span>/<span style="color:green">231</span>/<span style="color:#000099">658</span><span style="color:#000099"> nm, </span><span style="color:#C00000">T<sub>1</sub></span>/<span style="color:green">T<sub>2</sub></span>/T<sub>tot</sub> =<span style="color:#C00000"> 17:08</span>/<span style="color:green">9:23</span>/<span style="color:#000099">26:31 h</span>, PH = 10,732 h, T<sub>max-trip</sub> = 17:08 h.</p>
Full article ">Figure 10
<p>Optimization results of combined objectives D and PH for case study C3 (one vessel from the central port and one from a hub node) (the colours in the numbers below correspond to those of the lines in the maps). (<b>a</b>) C3a: <span style="color:#C00000">D<sub>1</sub></span>/<span style="color:green">D<sub>2</sub></span>/D<sub>tot</sub> = <span style="color:#C00000">443</span>/<span style="color:green">160</span>/603 nm, <span style="color:#C00000">T<sub>1</sub></span>/<span style="color:green">T<sub>2</sub></span>/T<sub>tot</sub> = <span style="color:#C00000">17:44</span>/<span style="color:green">15:38</span>/<span style="color:#000099">33:22 h</span>, PH = 16,627 h, T<sub>max-trip</sub> = 20:40 h. (<b>b</b>) C3b: <span style="color:#C00000">D<sub>1</sub></span>/<span style="color:green">D<sub>2</sub></span>/D<sub>tot</sub> = <span style="color:#C00000">500</span>/<span style="color:#000099">8</span><span style="color:green">5</span>/<span style="color:#000099">585 nm</span>, <span style="color:#C00000">T<sub>1</sub></span>/<span style="color:green">T<sub>2</sub></span>/T<sub>tot</sub> = <span style="color:#C00000">20:31</span>/<span style="color:green">15:21</span>/<span style="color:#000099">35:52 h</span>, PH = 19,852 h, T<sub>max-trip</sub> = 20:31 h. (<b>c</b>) C3c: <span style="color:#C00000">D<sub>1</sub></span>/<span style="color:green">D<sub>2</sub></span>/D<sub>tot</sub> =<span style="color:#C00000"> 486</span>/<span style="color:green">106</span>/<span style="color:#000099">592 nm</span>, <span style="color:#C00000">T<sub>1</sub></span>/<span style="color:green">T<sub>2</sub></span>/T<sub>tot</sub> =<span style="color:#C00000"> 19:30</span>/<span style="color:green">15:16</span>/<span style="color:#000099">34:46 h</span>, PH = 15,438 h, T<sub>max-trip</sub> = 19:30 h. (<b>d</b>) C3d: <span style="color:#C00000">D<sub>1</sub></span>/<span style="color:green">D<sub>2</sub></span>/D<sub>tot</sub> =<span style="color:#C00000"> 441</span>/<span style="color:green">170</span>/<span style="color:#000099">611 nm</span>, <span style="color:#C00000">T<sub>1</sub></span>/<span style="color:green">T<sub>2</sub></span>/T<sub>tot</sub> =<span style="color:#C00000"> 17:30</span>/<span style="color:green">16:44</span>/<span style="color:#000099">34:14 h</span>, PH = 16,894 h, T<sub>max-trip</sub> = 21:45 h.</p>
Full article ">Figure 11
<p>Optimization results for case study C4 (up to two vessels from central ports and one from a hub node) (the colours in the numbers below correspond to those of the lines in the maps). (<b>a</b>) C4a: <span style="color:#C00000">D<sub>1</sub></span>/<span style="color:green">D<sub>2</sub></span>/<span style="color:#CC6600">D<sub>3</sub></span>/D<sub>tot</sub> = <span style="color:#C00000">0</span>/<span style="color:green">347</span>/<span style="color:#CC6600">228</span>/575 nm, <span style="color:#C00000">T<sub>1</sub></span>/<span style="color:green">T<sub>2</sub></span>/<span style="color:#CC6600">T</span><sub><span style="color:#CC6600">3</span></sub>/T<sub>tot</sub> = <span style="color:#C00000">0:00</span>/<span style="color:green">14:11</span>/<span style="color:#CC6600">21:56</span>/<span style="color:#000099">36:07 h</span>, PH = 18,683 h, T<sub>max-trip</sub> = 29:33 h. (<b>b</b>) C4b: <span style="color:#C00000">D<sub>1</sub></span>/<span style="color:green">D<sub>2</sub></span>/<span style="color:#CC6600">D<sub>3</sub></span>/D<sub>tot</sub> = <span style="color:#C00000">390</span>/<span style="color:green">233</span>/<span style="color:#CC6600">97</span>/<span style="color:#000099">720 nm</span>, <span style="color:#C00000">T<sub>1</sub></span>/<span style="color:green">T<sub>2</sub></span>/<span style="color:#CC6600">T</span><sub><span style="color:#CC6600">3</span></sub>/T<sub>tot</sub> = <span style="color:#C00000">15:18</span>/<span style="color:green">9:23</span>/<span style="color:#CC6600">9:18</span>/<span style="color:#000099">34:09 h</span>, PH = 9863 h, T<sub>max-trip</sub> = 15:18 h. (<b>c</b>) C4c: <span style="color:#C00000">D<sub>1</sub></span>/<span style="color:green">D<sub>2</sub></span>/<span style="color:#CC6600">D<sub>3</sub></span>/D<sub>tot</sub> =<span style="color:#C00000"> 153</span>/<span style="color:green">233</span>/<span style="color:#CC6600">261</span>/<span style="color:#000099">617 nm</span>, <span style="color:#C00000">T<sub>1</sub></span>/<span style="color:green">T<sub>2</sub></span>/<span style="color:#CC6600">T</span><sub><span style="color:#CC6600">3</span></sub>/T<sub>tot</sub> =<span style="color:#C00000"> 6:00</span>/<span style="color:green">9:23</span>/<span style="color:#CC6600">22:24</span>/<span style="color:#000099">37:47 h</span>, PH = 12,012 h, T<sub>max-trip</sub> = 26:16 h. (<b>d</b>) C4d: (max trip time ≤ 15h), <span style="color:#C00000">D<sub>1</sub></span>/<span style="color:green">D<sub>2</sub></span>/<span style="color:#CC6600">D<sub>3</sub></span>/D<sub>tot</sub> =<span style="color:#C00000"> 290</span>/<span style="color:green">22</span>/<span style="color:#CC6600">53</span>/<span style="color:#000099">615 nm</span>, <span style="color:#C00000">T<sub>1</sub></span>/<span style="color:green">T<sub>2</sub></span>/<span style="color:#CC6600">T</span><sub><span style="color:#CC6600">3</span></sub>/T<sub>tot</sub> =<span style="color:#C00000"> 11:34</span>/<span style="color:green">11:04</span>/<span style="color:#CC6600">5:04</span>/<span style="color:#000099">27:48 h</span>, PH = 12,138 h, T<sub>max-trip</sub> = 11:34 h.</p>
Full article ">Figure 12
<p>Distance and passenger time trade-off diagram for case C3.</p>
Full article ">Figure 13
<p>Pareto front for scenario C4.</p>
Full article ">Figure 14
<p>Pareto fronts for different case scenarios.</p>
Full article ">Figure 15
<p>Traveled distance–cumulative passenger-hours point cloud across different runs: (<b>a</b>) full set of values; (<b>b</b>) subset of best values embodied in the circle of (<b>a</b>) (different colors correspond to different values of w<sub>1</sub> and w<sub>2</sub> of the objective function).</p>
Full article ">Figure 16
<p>Convergence curves for optimizing traveling distance in cases C1 to C4.</p>
Full article ">Figure 17
<p>Optimization results for case study C7b (up to four vessels from central ports and two from a hub node).</p>
Full article ">Figure 18
<p>Traveled distance–cumulative passenger hours point clouds at different weights of the objective function (1) (w<sub>1</sub> &gt;&gt; w<sub>2</sub> in blue, w<sub>1</sub> ≈ w<sub>2</sub> in orange, w<sub>1</sub> &lt;&lt; w<sub>2</sub> in green) (<b>a</b>) full set of values; (<b>b</b>) subset of best values embodied in the circle of (<b>a</b>).</p>
Full article ">
32 pages, 2679 KiB  
Review
An Overview of Privacy Dimensions on the Industrial Internet of Things (IIoT)
by Vasiliki Demertzi, Stavros Demertzis and Konstantinos Demertzis
Algorithms 2023, 16(8), 378; https://doi.org/10.3390/a16080378 - 6 Aug 2023
Cited by 12 | Viewed by 2583
Abstract
The rapid advancements in technology have given rise to groundbreaking solutions and practical applications in the field of the Industrial Internet of Things (IIoT). These advancements have had a profound impact on the structures of numerous industrial organizations. The IIoT, a seamless integration [...] Read more.
The rapid advancements in technology have given rise to groundbreaking solutions and practical applications in the field of the Industrial Internet of Things (IIoT). These advancements have had a profound impact on the structures of numerous industrial organizations. The IIoT, a seamless integration of the physical and digital realms with minimal human intervention, has ushered in radical changes in the economy and modern business practices. At the heart of the IIoT lies its ability to gather and analyze vast volumes of data, which is then harnessed by artificial intelligence systems to perform intelligent tasks such as optimizing networked units’ performance, identifying and correcting errors, and implementing proactive maintenance measures. However, implementing IIoT systems is fraught with difficulties, notably in terms of security and privacy. IIoT implementations are susceptible to sophisticated security attacks at various levels of networking and communication architecture. The complex and often heterogeneous nature of these systems makes it difficult to ensure availability, confidentiality, and integrity, raising concerns about mistrust in network operations, privacy breaches, and potential loss of critical, personal, and sensitive information of the network's end-users. To address these issues, this study aims to investigate the privacy requirements of an IIoT ecosystem as outlined by industry standards. It provides a comprehensive overview of the IIoT, its advantages, disadvantages, challenges, and the imperative need for industrial privacy. The research methodology encompasses a thorough literature review to gather existing knowledge and insights on the subject. Additionally, it explores how the IIoT is transforming the manufacturing industry and enhancing industrial processes, incorporating case studies and real-world examples to illustrate its practical applications and impact. Also, the research endeavors to offer actionable recommendations on implementing privacy-enhancing measures and establishing a secure IIoT ecosystem. Full article
(This article belongs to the Special Issue Computational Intelligence in Wireless Sensor Networks and IoT)
Show Figures

Figure 1

Figure 1
<p>Privacy and security in the IoT/IIoT using ADVOCATE architecture [<a href="#B27-algorithms-16-00378" class="html-bibr">27</a>].</p>
Full article ">Figure 2
<p>Blockchain scalable architecture for industrial ecosystems [<a href="#B4-algorithms-16-00378" class="html-bibr">4</a>].</p>
Full article ">Figure 3
<p>Basic security reference architecture in the industrial environment [<a href="#B45-algorithms-16-00378" class="html-bibr">45</a>].</p>
Full article ">Figure 4
<p>Use case of BANTA architecture in the ICS network [<a href="#B82-algorithms-16-00378" class="html-bibr">82</a>].</p>
Full article ">Figure 5
<p>Privacy-preserving industrial framework [<a href="#B104-algorithms-16-00378" class="html-bibr">104</a>].</p>
Full article ">
13 pages, 2214 KiB  
Article
Ensemble Transfer Learning for Distinguishing Cognitively Normal and Mild Cognitive Impairment Patients Using MRI
by Pratham Grover, Kunal Chaturvedi, Xing Zi, Amit Saxena, Shiv Prakash, Tony Jan and Mukesh Prasad
Algorithms 2023, 16(8), 377; https://doi.org/10.3390/a16080377 - 6 Aug 2023
Cited by 3 | Viewed by 2678
Abstract
Alzheimer’s disease is a chronic neurodegenerative disease that causes brain cells to degenerate, resulting in decreased physical and mental abilities and, in severe cases, permanent memory loss. It is considered as the most common and fatal form of dementia. Although mild cognitive impairment [...] Read more.
Alzheimer’s disease is a chronic neurodegenerative disease that causes brain cells to degenerate, resulting in decreased physical and mental abilities and, in severe cases, permanent memory loss. It is considered as the most common and fatal form of dementia. Although mild cognitive impairment (MCI) precedes Alzheimer’s disease (AD), it does not necessarily show the obvious symptoms of AD. As a result, it becomes challenging to distinguish between mild cognitive impairment and cognitively normal. In this paper, we propose an ensemble of deep learners based on convolutional neural networks for the early diagnosis of Alzheimer’s disease. The proposed approach utilises simple averaging ensemble and weighted averaging ensemble methods. The ensemble-based transfer learning model demonstrates enhanced generalization and performance for AD diagnosis compared to traditional transfer learning methods. Extensive experiments on the OASIS-3 dataset validate the effectiveness of the proposed model, showcasing its superiority over state-of-the-art transfer learning approaches in terms of accuracy, robustness, and efficiency. Full article
Show Figures

Figure 1

Figure 1
<p>Illustration of the proposed methodology.</p>
Full article ">Figure 2
<p>Graphical abstract of the proposed study.</p>
Full article ">Figure 3
<p>Illustration of the proposed cropping technique for the extracting region of interest: (<b>a</b>) original image, (<b>b</b>) finding the biggest contour, (<b>c</b>) finding the extreme points, (<b>d</b>) region of interest.</p>
Full article ">Figure 4
<p>Visualizations for examples of MRI images from the OASIS-3 dataset.</p>
Full article ">
18 pages, 5509 KiB  
Article
Comparison of Meta-Heuristic Optimization Algorithms for Global Maximum Power Point Tracking of Partially Shaded Solar Photovoltaic Systems
by Timmidi Nagadurga, Ramesh Devarapalli and Łukasz Knypiński
Algorithms 2023, 16(8), 376; https://doi.org/10.3390/a16080376 - 5 Aug 2023
Cited by 10 | Viewed by 2680
Abstract
Partial shading conditions lead to power mismatches among photovoltaic (PV) panels, resulting in the generation of multiple peak power points on the P-V curve. At this point, conventional MPPT algorithms fail to operate effectively. This research work mainly focuses on the exploration of [...] Read more.
Partial shading conditions lead to power mismatches among photovoltaic (PV) panels, resulting in the generation of multiple peak power points on the P-V curve. At this point, conventional MPPT algorithms fail to operate effectively. This research work mainly focuses on the exploration of performance optimization and harnessing more power during the partial shading environment of solar PV systems with a single-objective non-linear optimization problem subjected to different operations formulated and solved using recent metaheuristic algorithms such as Cat Swarm Optimization (CSO), Grey Wolf Optimization (GWO) and the proposed Chimp Optimization algorithm (ChOA). This research work is implemented on a test system with the help of MATLAB/SIMULINK, and the obtained results are discussed. From the overall results, the metaheuristic methods used by the trackers based on their analysis showed convergence towards the global Maximum Power Point (MPP). Additionally, the proposed ChOA technique shows improved performance over other existing algorithms. Full article
(This article belongs to the Special Issue Metaheuristic Algorithms in Optimal Design of Engineering Problems)
Show Figures

Figure 1

Figure 1
<p>P-V plot of PV module under changing shading conditions.</p>
Full article ">Figure 2
<p>The flow chart of the CSO algorithm.</p>
Full article ">Figure 3
<p>GWO algorithm flow chart.</p>
Full article ">Figure 4
<p>Variation of dynamic coefficients vector with different groups of ChOA.</p>
Full article ">Figure 5
<p>Influence of <span class="html-italic">a</span> on refining the chimp’s location mechanism.</p>
Full article ">Figure 6
<p>ChOA flow chart.</p>
Full article ">Figure 7
<p>Different irradiation patterns of PV system under shading conditions.</p>
Full article ">Figure 8
<p>Simulation circuit of four series-connected KC200GT PV module.</p>
Full article ">Figure 9
<p>P-V and P-I variations under the first shading pattern on PV string.</p>
Full article ">Figure 10
<p>Simulation result using CSO for the Patern-1.</p>
Full article ">Figure 11
<p>Simulation results using GWO for the Pattern-1.</p>
Full article ">Figure 12
<p>Simulation results using ChoA for the Pattern-1.</p>
Full article ">Figure 13
<p>Comparison of settling time for the CSO, GWO and ChoA algorithms.</p>
Full article ">Figure 14
<p>Comparison of output power with different MPPT Algorithms under other shading patterns.</p>
Full article ">
15 pages, 11652 KiB  
Article
Ascertaining the Ideality of Photometric Stereo Datasets under Unknown Lighting
by Elisa Crabu, Federica Pes, Giuseppe Rodriguez and Giuseppa Tanda
Algorithms 2023, 16(8), 375; https://doi.org/10.3390/a16080375 - 5 Aug 2023
Cited by 1 | Viewed by 1339
Abstract
The standard photometric stereo model makes several assumptions that are rarely verified in experimental datasets. In particular, the observed object should behave as a Lambertian reflector, and the light sources should be positioned at an infinite distance from it, along a known direction. [...] Read more.
The standard photometric stereo model makes several assumptions that are rarely verified in experimental datasets. In particular, the observed object should behave as a Lambertian reflector, and the light sources should be positioned at an infinite distance from it, along a known direction. Even when Lambert’s law is approximately fulfilled, an accurate assessment of the relative position between the light source and the target is often unavailable in real situations. The Hayakawa procedure is a computational method for estimating such information directly from data images. It occasionally breaks down when some of the available images excessively deviate from ideality. This is generally due to observing a non-Lambertian surface, or illuminating it from a close distance, or both. Indeed, in narrow shooting scenarios, typical, e.g., of archaeological excavation sites, it is impossible to position a flashlight at a sufficient distance from the observed surface. It is then necessary to understand if a given dataset is reliable and which images should be selected to better reconstruct the target. In this paper, we propose some algorithms to perform this task and explore their effectiveness. Full article
(This article belongs to the Special Issue Recent Advances in Algorithms for Computer Vision Applications)
Show Figures

Figure 1

Figure 1
<p>Engraving found in the <span class="html-italic">Domus de Janas</span> of Corongiu, in Pimentel (Sardinia, Italy).</p>
Full article ">Figure 2
<p>Lobby of the Neolithic tomb located in the <span class="html-italic">Domus de Janas</span> of Corongiu (Sardinia, Italy). The engraving is over the entrance to the internal chamber.</p>
Full article ">Figure 3
<p>The synthetic dataset used in the experiments is generated by applying the PS forward model to the surface displayed on the left, with a discretization of size <math display="inline"><semantics><mrow><mn>101</mn><mo>×</mo><mn>101</mn></mrow></semantics></math>; the images reported on the right are obtained by choosing 9 different light orientations.</p>
Full article ">Figure 4
<p>Relative errors in the <span class="html-italic">∞</span>-norm, obtained by processing either the whole synthetic dataset or the reduced datasets suggested by the algorithms under scrutiny; <math display="inline"><semantics><mrow><mi>δ</mi><mi>A</mi></mrow></semantics></math> is the distance of the light source from the object.</p>
Full article ">Figure 5
<p>The <span class="html-italic">Shell3</span> dataset is composed of 20 pictures of a seashell illuminated by sunlight; the light direction rotates counterclockwise; see [<a href="#B20-algorithms-16-00375" class="html-bibr">20</a>] for details.</p>
Full article ">Figure 6
<p>Three-dimensional (3D) reconstructions obtained after removing from the <span class="html-italic">Shell3</span> dataset the pictures selected by Algorithm 1 (<b>a</b>), the fast version of Algorithm 1 (<b>b</b>), Algorithm 2 (<b>c</b>), and the fast version of Algorithm 2 (<b>d</b>).</p>
Full article ">Figure 7
<p>Color picture of the seashell from which the <span class="html-italic">Shell3</span> dataset was created.</p>
Full article ">
17 pages, 523 KiB  
Article
A Greedy Pursuit Hierarchical Iteration Algorithm for Multi-Input Systems with Colored Noise and Unknown Time-Delays
by Ruijuan Du and Taiyang Tao
Algorithms 2023, 16(8), 374; https://doi.org/10.3390/a16080374 - 4 Aug 2023
Cited by 1 | Viewed by 1393
Abstract
This paper focuses on the joint estimation of parameters and time delays for multi-input systems that contain unknown input delays and colored noise. A greedy pursuit hierarchical iteration algorithm is proposed, which can reduce the estimation cost. Firstly, an over-parameterized approach is employed [...] Read more.
This paper focuses on the joint estimation of parameters and time delays for multi-input systems that contain unknown input delays and colored noise. A greedy pursuit hierarchical iteration algorithm is proposed, which can reduce the estimation cost. Firstly, an over-parameterized approach is employed to construct a sparse system model of multi-input systems even in the absence of prior knowledge of time delays. Secondly, the hierarchical principle is applied to replace the unknown true noise items with their estimation values, and a greedy pursuit search based on compressed sensing is employed to find key parameters using limited sampled data. The greedy pursuit search can effectively reduce the scale of the system model and improve the identification efficiency. Then, the parameters and time delays can be estimated simultaneously while considering the known orders and found locations of key parameters by utilizing iterative methods with limited sampled data. Finally, some simulations are provided to illustrate the effectiveness of the presented algorithm in this paper. Full article
Show Figures

Figure 1

Figure 1
<p>The multi-input systems with input time delays and colored noise.</p>
Full article ">Figure 2
<p>The estimation errors <math display="inline"><semantics><mi>δ</mi></semantics></math> versus <span class="html-italic">k</span> of Experiment 1 with <math display="inline"><semantics><mrow><mi>L</mi><mo>=</mo><mn>200</mn></mrow></semantics></math> (<math display="inline"><semantics><mrow><msup><mi>σ</mi><mn>2</mn></msup><mo>=</mo><msup><mn>0.50</mn><mn>2</mn></msup></mrow></semantics></math>, <math display="inline"><semantics><mrow><msup><mi>σ</mi><mn>2</mn></msup><mo>=</mo><msup><mn>1.00</mn><mn>2</mn></msup></mrow></semantics></math>).</p>
Full article ">Figure 3
<p>The estimated parameter values <math display="inline"><semantics><mrow><msub><mover accent="true"><mi>a</mi><mo stretchy="false">^</mo></mover><mn>1</mn></msub><mo>,</mo><msub><mover accent="true"><mi>a</mi><mo stretchy="false">^</mo></mover><mn>2</mn></msub><mo>,</mo><msub><mover accent="true"><mi>c</mi><mo stretchy="false">^</mo></mover><mn>1</mn></msub><mo>,</mo><msub><mover accent="true"><mi>f</mi><mo stretchy="false">^</mo></mover><mn>1</mn></msub></mrow></semantics></math> versus <span class="html-italic">k</span> of Experiment 1 with <math display="inline"><semantics><mrow><mi>L</mi><mo>=</mo><mn>200</mn></mrow></semantics></math> and <math display="inline"><semantics><mrow><msup><mi>σ</mi><mn>2</mn></msup><mo>=</mo><msup><mn>0.50</mn><mn>2</mn></msup></mrow></semantics></math>.</p>
Full article ">Figure 4
<p>The estimated parameter values <math display="inline"><semantics><mrow><msub><mover accent="true"><mi>b</mi><mo stretchy="false">^</mo></mover><mn>11</mn></msub><mo>,</mo><msub><mover accent="true"><mi>b</mi><mo stretchy="false">^</mo></mover><mn>12</mn></msub><mo>,</mo><msub><mover accent="true"><mi>b</mi><mo stretchy="false">^</mo></mover><mn>21</mn></msub><mo>,</mo><msub><mover accent="true"><mi>b</mi><mo stretchy="false">^</mo></mover><mn>22</mn></msub><mo>,</mo><msub><mover accent="true"><mi>b</mi><mo stretchy="false">^</mo></mover><mn>31</mn></msub><mo>,</mo><msub><mover accent="true"><mi>b</mi><mo stretchy="false">^</mo></mover><mn>32</mn></msub></mrow></semantics></math> versus <span class="html-italic">k</span> of Experiment 1 with <math display="inline"><semantics><mrow><mi>L</mi><mo>=</mo><mn>200</mn></mrow></semantics></math> and <math display="inline"><semantics><mrow><msup><mi>σ</mi><mn>2</mn></msup><mo>=</mo><msup><mn>0.50</mn><mn>2</mn></msup></mrow></semantics></math>.</p>
Full article ">Figure 5
<p>The estimated parameter values <math display="inline"><semantics><mrow><msub><mover accent="true"><mi>a</mi><mo stretchy="false">^</mo></mover><mn>1</mn></msub><mo>,</mo><msub><mover accent="true"><mi>a</mi><mo stretchy="false">^</mo></mover><mn>2</mn></msub><mo>,</mo><msub><mover accent="true"><mi>c</mi><mo stretchy="false">^</mo></mover><mn>1</mn></msub><mo>,</mo><msub><mover accent="true"><mi>f</mi><mo stretchy="false">^</mo></mover><mn>1</mn></msub></mrow></semantics></math> versus <span class="html-italic">k</span> of Experiment 1 with <math display="inline"><semantics><mrow><mi>L</mi><mo>=</mo><mn>200</mn></mrow></semantics></math> and <math display="inline"><semantics><mrow><msup><mi>σ</mi><mn>2</mn></msup><mo>=</mo><msup><mn>1.00</mn><mn>2</mn></msup></mrow></semantics></math>.</p>
Full article ">Figure 6
<p>The estimated parameter values <math display="inline"><semantics><mrow><msub><mover accent="true"><mi>b</mi><mo stretchy="false">^</mo></mover><mn>11</mn></msub><mo>,</mo><msub><mover accent="true"><mi>b</mi><mo stretchy="false">^</mo></mover><mn>12</mn></msub><mo>,</mo><msub><mover accent="true"><mi>b</mi><mo stretchy="false">^</mo></mover><mn>21</mn></msub><mo>,</mo><msub><mover accent="true"><mi>b</mi><mo stretchy="false">^</mo></mover><mn>22</mn></msub><mo>,</mo><msub><mover accent="true"><mi>b</mi><mo stretchy="false">^</mo></mover><mn>31</mn></msub><mo>,</mo><msub><mover accent="true"><mi>b</mi><mo stretchy="false">^</mo></mover><mn>32</mn></msub></mrow></semantics></math> versus <span class="html-italic">k</span> of Experiment 1 with <math display="inline"><semantics><mrow><mi>L</mi><mo>=</mo><mn>200</mn></mrow></semantics></math> and <math display="inline"><semantics><mrow><msup><mi>σ</mi><mn>2</mn></msup><mo>=</mo><msup><mn>1.00</mn><mn>2</mn></msup></mrow></semantics></math>.</p>
Full article ">Figure 7
<p>The true outputs, estimated outputs, and their bias of Experiment 1 with <math display="inline"><semantics><mrow><msup><mi>σ</mi><mn>2</mn></msup><mo>=</mo><msup><mn>0.50</mn><mn>2</mn></msup></mrow></semantics></math>.</p>
Full article ">Figure 8
<p>The true outputs, estimated outputs, and their bias of Experiment 1 with <math display="inline"><semantics><mrow><msup><mi>σ</mi><mn>2</mn></msup><mo>=</mo><msup><mn>1.00</mn><mn>2</mn></msup></mrow></semantics></math>.</p>
Full article ">Figure 9
<p>The estimation errors of the LSI and GPHI algorithms versus <span class="html-italic">k</span> of Experiment 2 (<math display="inline"><semantics><mrow><mi>L</mi><mo>=</mo><mn>250</mn><mo>,</mo><mspace width="1.em"/><msup><mi>σ</mi><mn>2</mn></msup><mo>=</mo><msup><mn>0.50</mn><mn>2</mn></msup></mrow></semantics></math>).</p>
Full article ">Figure 10
<p>The estimation errors <math display="inline"><semantics><mi>δ</mi></semantics></math> versus <span class="html-italic">k</span> of Experiment 2 with <math display="inline"><semantics><mrow><mi>L</mi><mo>=</mo><mn>250</mn></mrow></semantics></math> and (<math display="inline"><semantics><mrow><msup><mi>σ</mi><mn>2</mn></msup><mo>=</mo><msup><mn>0.50</mn><mn>2</mn></msup></mrow></semantics></math>, <math display="inline"><semantics><mrow><msup><mi>σ</mi><mn>2</mn></msup><mo>=</mo><msup><mn>1.00</mn><mn>2</mn></msup></mrow></semantics></math>).</p>
Full article ">Figure 11
<p>The estimated parameter values <math display="inline"><semantics><mrow><msub><mover accent="true"><mi>a</mi><mo stretchy="false">^</mo></mover><mn>1</mn></msub><mo>,</mo><msub><mover accent="true"><mi>a</mi><mo stretchy="false">^</mo></mover><mn>2</mn></msub><mo>,</mo><msub><mover accent="true"><mi>b</mi><mo stretchy="false">^</mo></mover><mn>11</mn></msub><mo>,</mo><msub><mover accent="true"><mi>b</mi><mo stretchy="false">^</mo></mover><mn>12</mn></msub><mo>,</mo><msub><mover accent="true"><mi>b</mi><mo stretchy="false">^</mo></mover><mn>21</mn></msub><mo>,</mo><msub><mover accent="true"><mi>b</mi><mo stretchy="false">^</mo></mover><mn>22</mn></msub><mo>,</mo><msub><mover accent="true"><mi>c</mi><mo stretchy="false">^</mo></mover><mn>1</mn></msub><mo>,</mo><msub><mover accent="true"><mi>f</mi><mo stretchy="false">^</mo></mover><mn>1</mn></msub></mrow></semantics></math> versus <span class="html-italic">k</span> of Experiment 2 with <math display="inline"><semantics><mrow><mi>L</mi><mo>=</mo><mn>250</mn></mrow></semantics></math> and <math display="inline"><semantics><mrow><msup><mi>σ</mi><mn>2</mn></msup><mo>=</mo><msup><mn>0.50</mn><mn>2</mn></msup></mrow></semantics></math>.</p>
Full article ">Figure 12
<p>The estimated parameter values <math display="inline"><semantics><mrow><msub><mover accent="true"><mi>b</mi><mo stretchy="false">^</mo></mover><mn>31</mn></msub><mo>,</mo><msub><mover accent="true"><mi>b</mi><mo stretchy="false">^</mo></mover><mn>32</mn></msub><mo>,</mo><msub><mover accent="true"><mi>b</mi><mo stretchy="false">^</mo></mover><mn>41</mn></msub><mo>,</mo><msub><mover accent="true"><mi>b</mi><mo stretchy="false">^</mo></mover><mn>42</mn></msub><mo>,</mo><msub><mover accent="true"><mi>b</mi><mo stretchy="false">^</mo></mover><mn>51</mn></msub><mo>,</mo><msub><mover accent="true"><mi>b</mi><mo stretchy="false">^</mo></mover><mn>52</mn></msub></mrow></semantics></math> versus <span class="html-italic">k</span> of Experiment 2 with <math display="inline"><semantics><mrow><mi>L</mi><mo>=</mo><mn>250</mn></mrow></semantics></math> and <math display="inline"><semantics><mrow><msup><mi>σ</mi><mn>2</mn></msup><mo>=</mo><msup><mn>0.50</mn><mn>2</mn></msup></mrow></semantics></math>.</p>
Full article ">Figure 13
<p>The estimated parameter values <math display="inline"><semantics><mrow><msub><mover accent="true"><mi>a</mi><mo stretchy="false">^</mo></mover><mn>1</mn></msub><mo>,</mo><msub><mover accent="true"><mi>a</mi><mo stretchy="false">^</mo></mover><mn>2</mn></msub><mo>,</mo><msub><mover accent="true"><mi>b</mi><mo stretchy="false">^</mo></mover><mn>11</mn></msub><mo>,</mo><msub><mover accent="true"><mi>b</mi><mo stretchy="false">^</mo></mover><mn>12</mn></msub><mo>,</mo><msub><mover accent="true"><mi>b</mi><mo stretchy="false">^</mo></mover><mn>21</mn></msub><mo>,</mo><msub><mover accent="true"><mi>b</mi><mo stretchy="false">^</mo></mover><mn>22</mn></msub><mo>,</mo><msub><mover accent="true"><mi>c</mi><mo stretchy="false">^</mo></mover><mn>1</mn></msub><mo>,</mo><msub><mover accent="true"><mi>f</mi><mo stretchy="false">^</mo></mover><mn>1</mn></msub></mrow></semantics></math> versus <span class="html-italic">k</span> of Experiment 2 with <math display="inline"><semantics><mrow><mi>L</mi><mo>=</mo><mn>250</mn></mrow></semantics></math> and <math display="inline"><semantics><mrow><msup><mi>σ</mi><mn>2</mn></msup><mo>=</mo><msup><mn>1.00</mn><mn>2</mn></msup></mrow></semantics></math>.</p>
Full article ">Figure 14
<p>The estimated parameter values <math display="inline"><semantics><mrow><msub><mover accent="true"><mi>b</mi><mo stretchy="false">^</mo></mover><mn>31</mn></msub><mo>,</mo><msub><mover accent="true"><mi>b</mi><mo stretchy="false">^</mo></mover><mn>32</mn></msub><mo>,</mo><msub><mover accent="true"><mi>b</mi><mo stretchy="false">^</mo></mover><mn>41</mn></msub><mo>,</mo><msub><mover accent="true"><mi>b</mi><mo stretchy="false">^</mo></mover><mn>42</mn></msub><mo>,</mo><msub><mover accent="true"><mi>b</mi><mo stretchy="false">^</mo></mover><mn>51</mn></msub><mo>,</mo><msub><mover accent="true"><mi>b</mi><mo stretchy="false">^</mo></mover><mn>52</mn></msub></mrow></semantics></math> versus <span class="html-italic">k</span> of Experiment 2 with <math display="inline"><semantics><mrow><mi>L</mi><mo>=</mo><mn>250</mn></mrow></semantics></math> and <math display="inline"><semantics><mrow><msup><mi>σ</mi><mn>2</mn></msup><mo>=</mo><msup><mn>1.00</mn><mn>2</mn></msup></mrow></semantics></math>.</p>
Full article ">Figure 15
<p>The true outputs, estimated outputs, and their bias of Experiment 2 with <math display="inline"><semantics><mrow><msup><mi>σ</mi><mn>2</mn></msup><mo>=</mo><msup><mn>0.50</mn><mn>2</mn></msup></mrow></semantics></math>.</p>
Full article ">Figure 16
<p>The true outputs, estimated outputs, and their bias of Experiment 2 with <math display="inline"><semantics><mrow><msup><mi>σ</mi><mn>2</mn></msup><mo>=</mo><msup><mn>1.00</mn><mn>2</mn></msup></mrow></semantics></math>.</p>
Full article ">
16 pages, 3396 KiB  
Article
Data-Driven Deployment of Cargo Drones: A U.S. Case Study Identifying Key Markets and Routes
by Raj Bridgelall
Algorithms 2023, 16(8), 373; https://doi.org/10.3390/a16080373 - 3 Aug 2023
Viewed by 1682
Abstract
Electric and autonomous aircraft (EAA) are set to disrupt current cargo-shipping models. To maximize the benefits of this technology, investors and logistics managers need information on target commodities, service location establishment, and the distribution of origin–destination pairs within EAA’s range limitations. This research [...] Read more.
Electric and autonomous aircraft (EAA) are set to disrupt current cargo-shipping models. To maximize the benefits of this technology, investors and logistics managers need information on target commodities, service location establishment, and the distribution of origin–destination pairs within EAA’s range limitations. This research introduces a three-phase data-mining and geographic information system (GIS) algorithm to support data-driven decision-making under uncertainty. Analysts can modify and expand this workflow to scrutinize origin–destination commodity flow datasets representing various locations. The algorithm identifies four commodity categories contributing to more than one-third of the value transported by aircraft across the contiguous United States, yet only 5% of the weight. The workflow highlights 8 out of 129 regional locations that moved more than 20% of the weight of those four commodity categories. A distance band of 400 miles among these eight locations accounts for more than 80% of the transported weight. This study addresses a literature gap, identifying opportunities for supply chain redesign using EAA. The presented methodology can guide planners and investors in identifying prime target markets for emerging EAA technologies using regional datasets. Full article
Show Figures

Figure 1

Figure 1
<p>Three-stage data-mining workflow.</p>
Full article ">Figure 2
<p>MSAs, other FAF Zones, and their centroids.</p>
Full article ">Figure 3
<p>Comparison of clustering results for Louvain (<b>a</b>,<b>b</b>), DBSCAN (<b>c</b>,<b>d</b>), and k-means (<b>e</b>,<b>f</b>).</p>
Full article ">Figure 4
<p>K-means clustered high-value, low-weight commodity categories transported by (<b>a</b>) air and (<b>b</b>) using trucks.</p>
Full article ">Figure 5
<p>Commodity category distribution by value proportion carried using (<b>a</b>) trucks and (<b>b</b>) by air.</p>
Full article ">Figure 6
<p>MSA weight distribution of (<b>a</b>) mixed goods, (<b>b</b>) electronics, (<b>c</b>) machinery, and (<b>d</b>) pharmaceuticals.</p>
Full article ">Figure 7
<p>Truckload equivalent and accumulated trip proportion for the selected commodities and MSAs.</p>
Full article ">
30 pages, 2668 KiB  
Article
Applying Particle Swarm Optimization Variations to Solve the Transportation Problem Effectively
by Chrysanthi Aroniadi and Grigorios N. Beligiannis
Algorithms 2023, 16(8), 372; https://doi.org/10.3390/a16080372 - 3 Aug 2023
Cited by 6 | Viewed by 1514
Abstract
The Transportation Problem (TP) is a special type of linear programming problem, where the objective is to minimize the cost of distributing a product from a number of sources to a number of destinations. Many methods for solving the TP have been studied [...] Read more.
The Transportation Problem (TP) is a special type of linear programming problem, where the objective is to minimize the cost of distributing a product from a number of sources to a number of destinations. Many methods for solving the TP have been studied over time. However, exact methods do not always succeed in finding the optimal solution or a solution that effectively approximates the optimal one. This paper introduces two new variations of the well-established Particle Swarm Optimization (PSO) algorithm named the Trigonometric Acceleration Coefficients-PSO (TrigAc-PSO) and the Four Sectors Varying Acceleration Coefficients PSO (FSVAC-PSO) and applies them to solve the TP. The performances of the proposed variations are examined and validated by carrying out extensive experimental tests. In order to demonstrate the efficiency of the proposed PSO variations, thirty two problems with different sizes have been solved to evaluate and demonstrate their performance. Moreover, the proposed PSO variations were compared with exact methods such as Vogel’s Approximation Method (VAM), the Total Differences Method 1 (TDM1), the Total Opportunity Cost Matrix-Minimal Total (TOCM-MT), the Juman and Hoque Method (JHM) and the Bilqis Chastine Erma method (BCE). Last but not least, the proposed variations were also compared with other PSO variations that are well known for their completeness and efficiency, such as Decreasing Weight Particle Swarm Optimization (DWPSO) and Time Varying Acceleration Coefficients (TVAC). Experimental results show that the proposed variations achieve very satisfactory results in terms of their efficiency and effectiveness compared to existing either exact or heuristic methods. Full article
(This article belongs to the Special Issue Metaheuristic Algorithms in Optimal Design of Engineering Problems)
Show Figures

Figure 1

Figure 1
<p>The number of optimal solutions that every method achieved.</p>
Full article ">Figure 2
<p>Average percentage deviation for each method.</p>
Full article ">Figure 3
<p>Accuracy for 20 particles.</p>
Full article ">Figure 4
<p>Accuracy for 40 particles.</p>
Full article ">Figure 5
<p>Accuracy for 50 particles.</p>
Full article ">
23 pages, 2236 KiB  
Article
Identification of Mechanical Parameters in Flexible Drive Systems Using Hybrid Particle Swarm Optimization Based on the Quasi-Newton Method
by Ishaq Hafez and Rached Dhaouadi
Algorithms 2023, 16(8), 371; https://doi.org/10.3390/a16080371 - 31 Jul 2023
Cited by 3 | Viewed by 1846
Abstract
This study presents hybrid particle swarm optimization with quasi-Newton (HPSO-QN), a hybrid optimization method for accurately identifying mechanical parameters in two-mass model (2MM) systems. These systems are commonly used to model and control high-performance electric drive systems with elastic joints, which are prevalent [...] Read more.
This study presents hybrid particle swarm optimization with quasi-Newton (HPSO-QN), a hybrid optimization method for accurately identifying mechanical parameters in two-mass model (2MM) systems. These systems are commonly used to model and control high-performance electric drive systems with elastic joints, which are prevalent in modern industrial production. The proposed method combines the global exploration capabilities of particle swarm optimization (PSO) with the local exploitation abilities of the quasi-Newton (QN) method to precisely estimate the motor and load inertias, shaft stiffness, and friction coefficients of the 2MM system. By integrating these two optimization techniques, the HPSO-QN method exhibits superior accuracy and performance compared to standard PSO algorithms. Experimental validation using a 2MM system demonstrates the effectiveness of the proposed method in accurately identifying and improving the mechanical parameters of these complex systems. The HPSO-QN method offers significant implications for enhancing the modeling, performance, and stability of 2MM systems and can be extended to other systems with flexible shafts and couplings. This study contributes to the development of accurate and effective parameter identification methods for complex systems, emphasizing the crucial role of precise parameter estimation in achieving optimal control performance and stability. Full article
(This article belongs to the Special Issue Nature-Inspired Algorithms for Optimization)
Show Figures

Figure 1

Figure 1
<p>Open-loop control structure of two-mass model (2MM) system.</p>
Full article ">Figure 2
<p>The two-mass model (2MM) experimental platform.</p>
Full article ">Figure 3
<p>Block diagram illustrating the overall system configuration of the two-mass model (2MM).</p>
Full article ">Figure 4
<p>Cost function (<math display="inline"><semantics> <mrow> <mi>F</mi> <mi>c</mi> <mi>o</mi> <mi>s</mi> <mi>t</mi> </mrow> </semantics></math>) analysis of the proposed methods with the best performance.</p>
Full article ">Figure 5
<p>Comparison of <math display="inline"><semantics> <mrow> <mi>F</mi> <mi>c</mi> <mi>o</mi> <mi>s</mi> <mi>t</mi> </mrow> </semantics></math> values obtained using the HPSO-QN MLSM optimization process.</p>
Full article ">Figure 6
<p>Comparison of integral absolute error (IAE), integral squared error (ISE), and integral time absolute error (ITAE) values between the simulated and experimental motor and load speed responses obtained using HPSO-QN MLSM and SPSO.</p>
Full article ">Figure 7
<p>Simulation response using estimated parameters compared with measured speeds (motor and load side).</p>
Full article ">
17 pages, 1330 KiB  
Article
Hardware Suitability of Complex Natural Resonances Extraction Algorithms in Backscattered Radar Signals
by Andres Gallego and Francisco Roman
Algorithms 2023, 16(8), 370; https://doi.org/10.3390/a16080370 - 31 Jul 2023
Viewed by 1422
Abstract
Complex natural resonances (CNRs) extraction methods such as matrix pencil method (MPM), Cauchy, vector-fitting Cauchy method (VCM), or Prony’s method decompose a signal in terms of frequency components and damping factors based on Baum’s singularity expansion method (SEM) either in the time or [...] Read more.
Complex natural resonances (CNRs) extraction methods such as matrix pencil method (MPM), Cauchy, vector-fitting Cauchy method (VCM), or Prony’s method decompose a signal in terms of frequency components and damping factors based on Baum’s singularity expansion method (SEM) either in the time or frequency domain. The validation of these CNRs is accomplished through a reconstruction of the signal based on these complex poles and residues and a comparison with the input signal. Here, we perform quantitative performance metrics in order to have an evaluation of each method’s hardware suitability factor before selecting a hardware platform using benchmark signals, simulations of backscattering scenarios, and experiments. Full article
(This article belongs to the Special Issue Digital Signal Processing Algorithms and Applications)
Show Figures

Figure 1

Figure 1
<p>Prony’s method algorithm in a general step-by-step flow chart.</p>
Full article ">Figure 2
<p>Benchmark signal and Prony’s CNR-based reconstruction.</p>
Full article ">Figure 3
<p>Prony’s CNRs calculated.</p>
Full article ">Figure 4
<p>General steps for implementing MPM algorithm and comparing input and output signals for CNRs validation.</p>
Full article ">Figure 5
<p>Input signal <math display="inline"><semantics> <mrow> <mi>y</mi> <mo>(</mo> <mi>t</mi> <mo>)</mo> <mo>=</mo> <mo form="prefix">sin</mo> <mrow> <mn>5</mn> <mi>t</mi> </mrow> <mo>+</mo> <mo form="prefix">sin</mo> <mrow> <mn>10</mn> <mi>t</mi> </mrow> </mrow> </semantics></math> and its reconstruction using the CNRs calculated through MPM.</p>
Full article ">Figure 6
<p>Poles <math display="inline"><semantics> <mrow> <msub> <mi>s</mi> <mi>i</mi> </msub> <mo>=</mo> <msub> <mi>α</mi> <mi>i</mi> </msub> <mo>+</mo> <mi>j</mi> <msub> <mi>ω</mi> <mi>i</mi> </msub> </mrow> </semantics></math> calculated with MPM from the benchmark signal <math display="inline"><semantics> <mrow> <mi>y</mi> <mo>(</mo> <mi>t</mi> <mo>)</mo> <mo>=</mo> <mo form="prefix">sin</mo> <mrow> <mn>5</mn> <mi>t</mi> </mrow> <mo>+</mo> <mo form="prefix">sin</mo> <mrow> <mn>10</mn> <mi>t</mi> </mrow> </mrow> </semantics></math>. These poles come in conjugated pairs in the complex plane.</p>
Full article ">Figure 7
<p>Generalized steps in Cauchy’s algorithm for finding the CNRs from an input signal, which is compared with the reconstructed one in the final step for validation purposes.</p>
Full article ">Figure 8
<p>Input signal and its reconstruction based on the poles and residues calculated through Cauchy’s method.</p>
Full article ">Figure 9
<p>Poles calculated through Cauchy’s method in the complex plane.</p>
Full article ">Figure 10
<p>VCM method for a frequency domain backscattered signal [<a href="#B12-algorithms-16-00370" class="html-bibr">12</a>].</p>
Full article ">Figure 11
<p>Input signal and its reconstruction based on the poles and residues calculated through the VCM method.</p>
Full article ">Figure 12
<p>Poles calculated using the VCM method, plotted in the complex plane.</p>
Full article ">Figure 13
<p>Thin wire time domain response for Prony’s based reconstruction, MPM, frequency domain response with Cauchy-based reconstruction, and VCM.</p>
Full article ">Figure 14
<p>Comparison of the CNR poles calculation of the simulated thin wire in the complex plane.</p>
Full article ">Figure 15
<p>Experimental setup for free space experiments and the metal cylinder with two Vivaldi antennas.</p>
Full article ">Figure 16
<p>Metal cylinder in free space. Prony reconstruction, MPM-based reconstruction, frequency response Cauchy method based reconstruction, and VCM reconstruction.</p>
Full article ">Figure 17
<p>Buried objects measurement in a sandbox. Time domain late-time response for Prony’s and MPM-based reconstructions, and frequency domain response for Cauchy’s and VCM reconstructions.</p>
Full article ">Figure 18
<p><math display="inline"><semantics> <msup> <mi>R</mi> <mn>2</mn> </msup> </semantics></math> comparison for CNREM in different scenarios.</p>
Full article ">Figure 19
<p>Average number of samples per CNREM in different scenarios.</p>
Full article ">Figure 20
<p>Execution time per CNREM.</p>
Full article ">Figure 21
<p>Average number of samples per HSF in different scenarios.</p>
Full article ">
22 pages, 2661 KiB  
Article
Human Action Representation Learning Using an Attention-Driven Residual 3DCNN Network
by Hayat Ullah and Arslan Munir
Algorithms 2023, 16(8), 369; https://doi.org/10.3390/a16080369 - 31 Jul 2023
Cited by 2 | Viewed by 1561
Abstract
The recognition of human activities using vision-based techniques has become a crucial research field in video analytics. Over the last decade, there have been numerous advancements in deep learning algorithms aimed at accurately detecting complex human actions in video streams. While these algorithms [...] Read more.
The recognition of human activities using vision-based techniques has become a crucial research field in video analytics. Over the last decade, there have been numerous advancements in deep learning algorithms aimed at accurately detecting complex human actions in video streams. While these algorithms have demonstrated impressive performance in activity recognition, they often exhibit a bias towards either model performance or computational efficiency. This biased trade-off between robustness and efficiency poses challenges when addressing complex human activity recognition problems. To address this issue, this paper presents a computationally efficient yet robust approach, exploiting saliency-aware spatial and temporal features for human action recognition in videos. To achieve effective representation of human actions, we propose an efficient approach called the dual-attentional Residual 3D Convolutional Neural Network (DA-R3DCNN). Our proposed method utilizes a unified channel-spatial attention mechanism, allowing it to efficiently extract significant human-centric features from video frames. By combining dual channel-spatial attention layers with residual 3D convolution layers, the network becomes more discerning in capturing spatial receptive fields containing objects within the feature maps. To assess the effectiveness and robustness of our proposed method, we have conducted extensive experiments on four well-established benchmark datasets for human action recognition. The quantitative results obtained validate the efficiency of our method, showcasing significant improvements in accuracy of up to 11% as compared to state-of-the-art human action recognition methods. Additionally, our evaluation of inference time reveals that the proposed method achieves up to a 74× improvement in frames per second (FPS) compared to existing approaches, thus showing the suitability and effectiveness of the proposed DA-R3DCNN for real-time human activity recognition. Full article
(This article belongs to the Special Issue Algorithms for Image Processing and Machine Vision)
Show Figures

Figure 1

Figure 1
<p>The graphical abstract of our proposed DA-R3DCNN network architecture.</p>
Full article ">Figure 2
<p>The visual overview of the utilized 3D residual convolutional block used in this study, with convoluted shortcut path.</p>
Full article ">Figure 3
<p>The visual overview of the dual channel-spatial attention module.</p>
Full article ">Figure 4
<p>Architecture of the dual channel-spatial attention module.</p>
Full article ">Figure 5
<p>Confusion matrices computed for the proposed DA-R3DCNN framework for the test sets of four experimented datasets: (<b>a</b>) UCF11 dataset, (<b>b</b>) UCF50 dataset, (<b>c</b>) HMDB51 dataset, and (<b>d</b>) UCF101 dataset.</p>
Full article ">Figure 6
<p>The graphical overview of the conducted comparative analysis of our proposed DA-R3DCNN with the state-of-the-art methods on (<b>a</b>) UCF11 dataset, (<b>b</b>) UCF50 dataset, (<b>c</b>) HMDB51 dataset, and (<b>d</b>) UCF101 dataset.</p>
Full article ">
3 pages, 158 KiB  
Editorial
Special Issue “Algorithms for Feature Selection”
by Muhammad Adnan Khan
Algorithms 2023, 16(8), 368; https://doi.org/10.3390/a16080368 - 31 Jul 2023
Cited by 1 | Viewed by 1096
Abstract
This Special Issue of the open access journal Algorithms is dedicated to showcasing cutting-edge research in algorithms for feature selection [...] Full article
(This article belongs to the Special Issue Algorithms for Feature Selection)
19 pages, 5844 KiB  
Article
Design and Development of Energy Efficient Algorithm for Smart Beekeeping Device to Device Communication Based on Data Aggregation Techniques
by Elias Ntawuzumunsi, Santhi Kumaran, Louis Sibomana and Kambombo Mtonga
Algorithms 2023, 16(8), 367; https://doi.org/10.3390/a16080367 - 30 Jul 2023
Cited by 5 | Viewed by 1657
Abstract
Bees, like other insects, indirectly contribute to job creation, food security, and poverty reduction. However, across many parts of the world, bee populations are in decline, affecting crop yields due to reduced pollination and ultimately impacting human nutrition. Technology holds promise for countering [...] Read more.
Bees, like other insects, indirectly contribute to job creation, food security, and poverty reduction. However, across many parts of the world, bee populations are in decline, affecting crop yields due to reduced pollination and ultimately impacting human nutrition. Technology holds promise for countering the impacts of human activities and climatic change on bees’ survival and honey production. However, considering that smart beekeeping activities mostly operate in remote areas where the use of grid power is inaccessible and the use of batteries to power is not feasible, there is thus a need for such systems to be energy efficient. This work explores the integration of device-to-device communication with 5G technology as a solution to overcome the energy and throughput concerns in smart beekeeping technology. Mobile-based device-to-device communication facilitates devices to communicate directly without the need of immediate infrastructure. This type of communication offers advantages in terms of delay reduction, increased throughput, and reduced energy consumption. The faster data transmission capabilities and low-power modes of 5G networks would significantly enhance the energy efficiency during the system’s idle or standby states. Additionally, the paper analyzes the application of both the discovery and communication services offered by 5G in device-to-device-based smart bee farming. A novel, energy-efficient algorithm for smart beekeeping was developed using data integration and data scheduling and its performance was compared to existing algorithms. The simulation results demonstrated that the proposed smart beekeeping device-to-device communication with data integration guarantees a good quality of service while enhancing energy efficiency. Full article
(This article belongs to the Section Combinatorial Optimization, Graph, and Network Algorithms)
Show Figures

Figure 1

Figure 1
<p>SBD2D system architecture.</p>
Full article ">Figure 2
<p>Proposed system model for smart beekeeping using 5G D2D communications.</p>
Full article ">Figure 3
<p>Relay node transmission.</p>
Full article ">Figure 4
<p>Proposed block diagram integrating data scheduling.</p>
Full article ">Figure 5
<p>Shows SBD2D System model based on data integration.</p>
Full article ">Figure 6
<p>Energy efficiency with Antenna/Channel propagation and energy efficiency, including circuit power.</p>
Full article ">Figure 7
<p>(<b>a</b>) Data rate vs. power transmission. (<b>b</b>) Energy-efficient vs. power transmission.</p>
Full article ">Figure 8
<p>Energy efficient algorithm results in smart beekeeping D2D communication.</p>
Full article ">Figure 9
<p>Performance and results of SBD2D based on data integration.</p>
Full article ">Figure 10
<p>(<b>a</b>) Ratio of SBD2D users according to diverse SBD2D conveying powers, (<b>b</b>) CDF of Throughput for SBD2D connections with τ<sub>D2D</sub> = 0 dBm, and (<b>c</b>) CDF of Throughput for SBD2D connections with τ<sub>D2D</sub> = 4 dBm.</p>
Full article ">Figure 11
<p>(<b>a</b>) Mean Throughput of SBD2D vs. bandwidth for SBD2D = 0 dB–4 dB, (<b>b</b>) Total energy consumption vs. different SBD2D transmitting powers with <span class="html-italic">P<sub>bs</sub></span> = 46 dBm, and (<b>c</b>) Energy-Efficiency vs. different SBD2D transmitting powers for τ<sub>D2D</sub> = 0 dB and 4 dB, <span class="html-italic">P<sub>bs</sub></span> = 46 dBm, and W<sub>D2D</sub> = 5 MHz. Black dotted curves in (<b>b</b>,<b>c</b>) represent scenarios without SBD2D communication.</p>
Full article ">Figure 12
<p>(<b>a</b>). Energy efficiency comparison based on D2D Transmitted power. (<b>b</b>). Throughput comparison based on different number of D2D Sensor Node, [<a href="#B12-algorithms-16-00367" class="html-bibr">12</a>,<a href="#B13-algorithms-16-00367" class="html-bibr">13</a>].</p>
Full article ">
12 pages, 1932 KiB  
Article
Machine-Learning Techniques for Predicting Phishing Attacks in Blockchain Networks: A Comparative Study
by Kunj Joshi, Chintan Bhatt, Kaushal Shah, Dwireph Parmar, Juan M. Corchado, Alessandro Bruno and Pier Luigi Mazzeo
Algorithms 2023, 16(8), 366; https://doi.org/10.3390/a16080366 - 29 Jul 2023
Cited by 10 | Viewed by 4859
Abstract
Security in the blockchain has become a topic of concern because of the recent developments in the field. One of the most common cyberattacks is the so-called phishing attack, wherein the attacker tricks the miner into adding a malicious block to the chain [...] Read more.
Security in the blockchain has become a topic of concern because of the recent developments in the field. One of the most common cyberattacks is the so-called phishing attack, wherein the attacker tricks the miner into adding a malicious block to the chain under genuine conditions to avoid detection and potentially destroy the entire blockchain. The current attempts at detection include the consensus protocol; however, it fails when a genuine miner tries to add a new block to the blockchain. Zero-trust policies have started making the rounds in the field as they ensure the complete detection of phishing attempts; however, they are still in the process of deployment, which may take a significant amount of time. A more accurate measure of phishing detection involves machine-learning models that use specific features to automate the entire process of classifying an attempt as either a phishing attempt or a safe attempt. This paper highlights several models that may give safe results and help eradicate blockchain phishing attempts. Full article
(This article belongs to the Special Issue Deep Learning Techniques for Computer Security Problems)
Show Figures

Figure 1

Figure 1
<p>Distribution of outputs concerning index in the database.</p>
Full article ">Figure 2
<p>Illustrating all datapoints, which had the same value for feature: ERC20 average time between sent TNX.</p>
Full article ">Figure 3
<p>Illustrating a single outlier while all other datapoints have the same value for feature: ERC20 total Ether received.</p>
Full article ">Figure 4
<p>A flowchart explaining the flow of the procedure.</p>
Full article ">Figure 5
<p>Confusion matrix for random forest classifier.</p>
Full article ">Figure 6
<p>Confusion matrix for XGBoost classifier.</p>
Full article ">
Previous Issue
Back to TopTop