[go: up one dir, main page]

Next Issue
Volume 15, September
Previous Issue
Volume 15, July
 
 

Algorithms, Volume 15, Issue 8 (August 2022) – 41 articles

Cover Story (view full-size image): Recent studies have been evaluating the presence of patterns associated with the occurrence of cancer in different types of tissue. In this article, we describe preliminary results for the automatic detection of cancer (Walker 256 tumor) in laboratory animals using preclinical microphotographs of the subject’s liver tissue. In the proposed approach, two different types of descriptors were explored to capture texture properties from the images, one based on spectral information and another built by application of a granulometry given by a family of morphological filters. We tried three different classifier methods (SVM, kNN, and logistic regression). Promising results were obtained for both descriptors in isolation, and even better results were achieved by combining classifiers based on them. View this paper
  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list.
  • You may sign up for e-mail alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.
Order results
Result details
Section
Select all
Export citation of selected articles as:
19 pages, 443 KiB  
Article
QFC: A Parallel Software Tool for Feature Construction, Based on Grammatical Evolution
by Ioannis G. Tsoulos
Algorithms 2022, 15(8), 295; https://doi.org/10.3390/a15080295 - 21 Aug 2022
Cited by 5 | Viewed by 2381
Abstract
This paper presents and analyzes a programming tool that implements a method for classification and function regression problems. This method builds new features from existing ones with the assistance of a hybrid algorithm that makes use of artificial neural networks and grammatical evolution. [...] Read more.
This paper presents and analyzes a programming tool that implements a method for classification and function regression problems. This method builds new features from existing ones with the assistance of a hybrid algorithm that makes use of artificial neural networks and grammatical evolution. The implemented software exploits modern multi-core computing units for faster execution. The method has been applied to a variety of classification and function regression problems, and an extensive comparison with other methods of computational intelligence is made. Full article
(This article belongs to the Special Issue Algorithms in Data Classification)
Show Figures

Figure 1

Figure 1
<p>Schematic representation of the feature construction technique.</p>
Full article ">Figure 2
<p>BNF grammar of the proposed method.</p>
Full article ">Figure 3
<p>Example of one-point crossover.</p>
Full article ">Figure 4
<p>Example of input file for regression/classification.</p>
Full article ">Figure 5
<p>An example output file for the BL dataset.</p>
Full article ">
20 pages, 593 KiB  
Article
Properties and Recognition of Atom Graphs
by Geneviève Simonet and Anne Berry
Algorithms 2022, 15(8), 294; https://doi.org/10.3390/a15080294 - 19 Aug 2022
Viewed by 1525
Abstract
The atom graph of a connected graph is a graph whose vertices are the atoms obtained by clique minimal separator decomposition of this graph, and whose edges are the edges of all its atom trees. A graph G is an atom graph if [...] Read more.
The atom graph of a connected graph is a graph whose vertices are the atoms obtained by clique minimal separator decomposition of this graph, and whose edges are the edges of all its atom trees. A graph G is an atom graph if there is a graph whose atom graph is isomorphic to G. We study the class of atom graphs, which is also the class of atom graphs of chordal graphs, and the associated recognition problem. We prove that each atom graph is a perfect graph and give a characterization of atom graphs in terms of a spanning tree, inspired by the characterization of clique graphs of chordal graphs as expanded trees. We also characterize the chordal graphs having the same atom and clique graph, and solve the recognition problem of atom graphs of two graph classes. Full article
(This article belongs to the Special Issue Combinatorial Designs: Theory and Applications)
Show Figures

Figure 1

Figure 1
<p>A chordal graph, its non-perfect clique graph and its chordal atom graph.</p>
Full article ">Figure 2
<p>A chordal graph, its chordal clique graph and its non-chordal (but perfect) atom graph.</p>
Full article ">Figure 3
<p>A graph and its atom graph having an induced <math display="inline"><semantics> <msub> <mi>C</mi> <mn>4</mn> </msub> </semantics></math> whose edges are associated with the same clique minimal separator <span class="html-italic">S</span>.</p>
Full article ">Figure 4
<p>A graph and its atom graph having an induced <math display="inline"><semantics> <msub> <mi>C</mi> <mn>4</mn> </msub> </semantics></math> whose edges are associated with two distinct clique minimal separators (<math display="inline"><semantics> <mrow> <mo>{</mo> <mn>2</mn> <mo>}</mo> </mrow> </semantics></math> and <math display="inline"><semantics> <mrow> <mo>{</mo> <mn>7</mn> <mo>}</mo> </mrow> </semantics></math>).</p>
Full article ">Figure 5
<p>The 3-sun is an atom graph.</p>
Full article ">Figure 6
<p>An AG-expanded tree <span class="html-italic">G</span> and one of its AG-expanded structures.</p>
Full article ">Figure 7
<p>Construction of a graph <math display="inline"><semantics> <msup> <mi>G</mi> <mo>′</mo> </msup> </semantics></math> such that <span class="html-italic">G</span> is isomorphic to <math display="inline"><semantics> <mrow> <mi>A</mi> <mi>G</mi> <mo>(</mo> <msup> <mi>G</mi> <mo>′</mo> </msup> <mo>)</mo> </mrow> </semantics></math> from an AG-structure of <span class="html-italic">G</span>.</p>
Full article ">Figure 8
<p>The 4-sun is a join-path-expanded tree.</p>
Full article ">Figure 9
<p>A graph of <math display="inline"><semantics> <msub> <mi mathvariant="script">G</mi> <mrow> <mi>n</mi> <mi>i</mi> <mi>n</mi> <mi>c</mi> </mrow> </msub> </semantics></math>, its atom graph <span class="html-italic">G</span>, which is a block graph, and the block graph <math display="inline"><semantics> <mrow> <msup> <mi>G</mi> <mo>′</mo> </msup> <mo>=</mo> <mi>R</mi> <mi>e</mi> <mi>t</mi> <mi>r</mi> <mi>o</mi> <mi>C</mi> <mi>G</mi> <mrow> <mo>(</mo> <mi>G</mi> <mo>)</mo> </mrow> </mrow> </semantics></math> whose atom graph is isomorphic to <span class="html-italic">G</span>.</p>
Full article ">
20 pages, 2415 KiB  
Article
Defending against FakeBob Adversarial Attacks in Speaker Verification Systems with Noise-Adding
by Zesheng Chen, Li-Chi Chang, Chao Chen, Guoping Wang and Zhuming Bi
Algorithms 2022, 15(8), 293; https://doi.org/10.3390/a15080293 - 17 Aug 2022
Cited by 3 | Viewed by 1941
Abstract
Speaker verification systems use human voices as an important biometric to identify legitimate users, thus adding a security layer to voice-controlled Internet-of-things smart homes against illegal access. Recent studies have demonstrated that speaker verification systems are vulnerable to adversarial attacks such as FakeBob. [...] Read more.
Speaker verification systems use human voices as an important biometric to identify legitimate users, thus adding a security layer to voice-controlled Internet-of-things smart homes against illegal access. Recent studies have demonstrated that speaker verification systems are vulnerable to adversarial attacks such as FakeBob. The goal of this work is to design and implement a simple and light-weight defense system that is effective against FakeBob. We specifically study two opposite pre-processing operations on input audios in speak verification systems: denoising that attempts to remove or reduce perturbations and noise-adding that adds small noise to an input audio. Through experiments, we demonstrate that both methods are able to weaken the ability of FakeBob attacks significantly, with noise-adding achieving even better performance than denoising. Specifically, with denoising, the targeted attack success rate of FakeBob attacks can be reduced from 100% to 56.05% in GMM speaker verification systems, and from 95% to only 38.63% in i-vector speaker verification systems, respectively. With noise adding, those numbers can be further lowered down to 5.20% and 0.50%, respectively. As a proactive measure, we study several possible adaptive FakeBob attacks against the noise-adding method. Experiment results demonstrate that noise-adding can still provide a considerable level of protection against these countermeasures. Full article
Show Figures

Figure 1

Figure 1
<p>A score-based speaker verification system.</p>
Full article ">Figure 2
<p>The process of FakeBob adversarial attacks.</p>
Full article ">Figure 3
<p>An adversarial audio in the time domain and its perturbations in both the time domain and the mel spectrogram. (<b>a</b>) Adversarial audio in time domain; (<b>b</b>) perturbations in time domain; (<b>c</b>) perturbations in mel spectrogram.</p>
Full article ">Figure 4
<p>The proposed defense system.</p>
Full article ">Figure 5
<p>The mel spectrograms of an adversarial audio, a denoised adversarial audio, and a noise-added adversarial audio. (<b>a</b>) Adversarial audio; (<b>b</b>) denoised adversarial audio; (<b>c</b>) noise-added adversarial audio.</p>
Full article ">Figure 6
<p>Performance of the strategy of bypassing the plugin function by adaptive FakeBob attacks with different <math display="inline"><semantics> <mi>ϵ</mi> </semantics></math> in GMM SV systems.</p>
Full article ">Figure 7
<p>Performance of the adaptive FakeBob attacks with <math display="inline"><semantics> <mrow> <mi>ϵ</mi> <mo>=</mo> <mn>0.002</mn> </mrow> </semantics></math> in GMM SV systems with noise-adding.</p>
Full article ">Figure 8
<p>Performance of the noise-adding defense with different types of noise on the normal operations of GMM SV systems.</p>
Full article ">Figure 9
<p>Performance of the noise-adding defense with different types of noise on FakeBob adversarial audios in GMM SV systems.</p>
Full article ">
29 pages, 10473 KiB  
Article
Improving the Efficiency of Oncological Diagnosis of the Breast Based on the Combined Use of Simulation Modeling and Artificial Intelligence Algorithms
by Alexander V. Khoperskov and Maxim V. Polyakov
Algorithms 2022, 15(8), 292; https://doi.org/10.3390/a15080292 - 17 Aug 2022
Cited by 5 | Viewed by 2273
Abstract
This work includes a brief overview of the applications of the powerful and easy-to-perform method of microwave radiometry (MWR) for the diagnosis of various diseases. The main goal of this paper is to develop a method for diagnosing breast oncology based on machine [...] Read more.
This work includes a brief overview of the applications of the powerful and easy-to-perform method of microwave radiometry (MWR) for the diagnosis of various diseases. The main goal of this paper is to develop a method for diagnosing breast oncology based on machine learning algorithms using thermometric data, both real medical measurements and simulation results of MWR examinations. The dataset includes distributions of deep and skin temperatures calculated in numerical models of the dynamics of thermal and radiation fields inside biological tissue. The constructed combined dataset allows us to explore the limits of applicability of the MWR method for detecting weak tumors. We use convolutional neural networks and classic machine learning algorithms (k-nearest neighbors, naive Bayes classifier, support vector machine) to classify data. The construction of Kohonen self-organizing maps to explore the structure of our combined dataset demonstrated differences between the temperatures of patients with positive and negative diagnoses. Our analysis shows that the MWR can detect tumors with a radius of up to 0.5 cm if they are at the stage of rapid growth, when the tumor volume doubling occurs in approximately 100 days or less. The use of convolutional neural networks for MWR provides both high sensitivity (sens=0.86) and specificity (spec=0.82), which is an advantage over other methods for diagnosing breast cancer. A new modified scheme for medical measurements of IR temperature and brightness temperature is proposed for a larger number of points in the breast compared to the classical scheme. This approach can increase the effectiveness and sensitivity of diagnostics by several percent. Full article
(This article belongs to the Special Issue Artificial Intelligence Algorithms for Medicine)
Show Figures

Figure 1

Figure 1
<p>Some applications of microwave radiation in medicine.</p>
Full article ">Figure 2
<p>The spectral density of electromagnetic radiation <math display="inline"><semantics> <msub> <mi>B</mi> <mi>ν</mi> </msub> </semantics></math> at temperature <span class="html-italic">T</span> = 37 <math display="inline"><semantics> <msup> <mrow/> <mo>∘</mo> </msup> </semantics></math>C (blue line): the left axis is the dependence <math display="inline"><semantics> <mrow> <msub> <mi>B</mi> <mi>ν</mi> </msub> <mrow> <mo>(</mo> <mi>ν</mi> <mo>;</mo> <mi>T</mi> <mo>)</mo> </mrow> </mrow> </semantics></math>, <math display="inline"><semantics> <mi>ν</mi> </semantics></math> is the radiation frequency (<math display="inline"><semantics> <mrow> <mo>[</mo> <mi>ν</mi> <mo>]</mo> </mrow> </semantics></math> = Hz). The magenta line shows the range for microwave radiation. Other colored lines are explained in the text.</p>
Full article ">Figure 3
<p>The MWR method has been successfully applied to the following organs, tissues, and diseases: 1—brain [<a href="#B7-algorithms-15-00292" class="html-bibr">7</a>,<a href="#B25-algorithms-15-00292" class="html-bibr">25</a>,<a href="#B43-algorithms-15-00292" class="html-bibr">43</a>,<a href="#B56-algorithms-15-00292" class="html-bibr">56</a>]; 2—breast [<a href="#B10-algorithms-15-00292" class="html-bibr">10</a>,<a href="#B12-algorithms-15-00292" class="html-bibr">12</a>,<a href="#B13-algorithms-15-00292" class="html-bibr">13</a>,<a href="#B16-algorithms-15-00292" class="html-bibr">16</a>]; 3—carotid arteries [<a href="#B49-algorithms-15-00292" class="html-bibr">49</a>]; 4—venous diseases of the lower extremities [<a href="#B8-algorithms-15-00292" class="html-bibr">8</a>]; 5—coronavirus infection (COVID-19) [<a href="#B4-algorithms-15-00292" class="html-bibr">4</a>]; 6—arthritis of the large joints (elbow (6<span class="html-italic">a</span>), knee (6<span class="html-italic">b</span>), ankle (6<span class="html-italic">c</span>) [<a href="#B46-algorithms-15-00292" class="html-bibr">46</a>,<a href="#B57-algorithms-15-00292" class="html-bibr">57</a>], rheumatoid arthritic knee joints [<a href="#B11-algorithms-15-00292" class="html-bibr">11</a>], sacroiliac joints [<a href="#B45-algorithms-15-00292" class="html-bibr">45</a>]; 7—spine arthritis [<a href="#B58-algorithms-15-00292" class="html-bibr">58</a>]; 8—acute inflammatory diseases of the prostate [<a href="#B42-algorithms-15-00292" class="html-bibr">42</a>]; 9—kidney disease [<a href="#B42-algorithms-15-00292" class="html-bibr">42</a>,<a href="#B59-algorithms-15-00292" class="html-bibr">59</a>]; 10—cardiovascular diseases [<a href="#B50-algorithms-15-00292" class="html-bibr">50</a>]; 11—bladder [<a href="#B59-algorithms-15-00292" class="html-bibr">59</a>]; 12—pathology of the female reproductive system [<a href="#B54-algorithms-15-00292" class="html-bibr">54</a>]; 13—diabetic foot ulceration pathology [<a href="#B60-algorithms-15-00292" class="html-bibr">60</a>]; 14—thyroid [<a href="#B61-algorithms-15-00292" class="html-bibr">61</a>].</p>
Full article ">Figure 4
<p>Dependence of tumor specific heat release <math display="inline"><semantics> <msup> <mi>Q</mi> <mrow> <mo>(</mo> <mi>c</mi> <mi>a</mi> <mi>n</mi> <mo>)</mo> </mrow> </msup> </semantics></math> on doubling time for 128 breasts, where tumor diameter is 0.4 cm <math display="inline"><semantics> <mrow> <mo>≤</mo> <mi>D</mi> <mo>≤</mo> </mrow> </semantics></math> 4 cm [<a href="#B62-algorithms-15-00292" class="html-bibr">62</a>].</p>
Full article ">Figure 5
<p>The structure of the breast: 1—the breast lobe; 2—the lobules; 3—the areola; 4—the nipple; 5—the lactiferous sinus; 6—the lactiferous duct; 7—the adipose tissue; 8—the skin; 9—the subcutaneous fat pad; 10—the rib cage; 11—the intercostal muscle; 12—the pectoralis major muscle; 13—the suspensory ligaments (of Cooper); 14—the lymph node; 15—the circulatory system (arterial and venous subsystems); 16—the tumor. (The basis of medical illustration: Patrick J. Lynch, medical illustrator; C. Carl Jaffe).</p>
Full article ">Figure 6
<p>General procedure for constructing a 3D model of biological tissue.</p>
Full article ">Figure 7
<p>Procedure to construct a 3D breast model of different components in Blender: steps for constructing a single breast lobe model (<b>a</b>–<b>c</b>), system of the lactiferous sinus and breast lobes (<b>d</b>–<b>e</b>), the blood flow includes arteries (red) and veins (blue) (<b>f</b>), the skin (<b>g</b>), the subcutaneous fat pad (<b>h</b>), and the section of the final 3D model of the breast with textures (<b>i</b>).</p>
Full article ">Figure 8
<p>Scheme for modeling measurements of the brightness temperature and the IR temperature of the skin.</p>
Full article ">Figure 9
<p>Brightness temperature distributions based on the results of simulations using a modified measurement scheme for four models (1—<b>a</b>,<b>e</b>; 2—<b>b</b>,<b>f</b>; 3—<b>c</b>,<b>g</b>; 4—<b>d</b>,<b>h</b>): top row—without tumor, bottom row—with tumor. Tumor parameters: <math display="inline"><semantics> <msup> <mi>Q</mi> <mrow> <mo>(</mo> <mi>c</mi> <mi>a</mi> <mi>n</mi> <mo>)</mo> </mrow> </msup> </semantics></math> = 35,400 W·m<math display="inline"><semantics> <msup> <mrow/> <mrow> <mo>−</mo> <mn>3</mn> </mrow> </msup> </semantics></math>, <math display="inline"><semantics> <mrow> <mi>R</mi> <mo>=</mo> <mn>1</mn> </mrow> </semantics></math> cm.</p>
Full article ">Figure 10
<p>The scheme for measuring the temperature of the breast according to the standard method of MWR + IR examinations contains nine points on the surface of each breast (<math display="inline"><semantics> <mrow> <mn>0</mn> <mo>,</mo> <mn>1</mn> <mo>,</mo> <mn>2</mn> <mo>,</mo> <mo>…</mo> <mo>,</mo> <mn>8</mn> </mrow> </semantics></math>), an axillary point in the area of the lymph nodes (9), and two points at the sternum bottom (T1 and T2), which gives 22 points in total (<b>a</b>). The extended set of antenna location points on the breast surface proposed and studied by us in this paper contains 38 points (<b>b</b>).</p>
Full article ">Figure 11
<p>Clustering scheme using Kohonen’s self-organizing map (<b>a</b>). An example of the Kohonen map in the projection on the temperature plane: the class of models “Sick” is marked in red, the blue color highlights the class of models “Healthy” (<b>b</b>) (the horizontal axis is the temperature (<math display="inline"><semantics> <msup> <mrow/> <mo>∘</mo> </msup> </semantics></math>C) at the point “0”; the vertical axis is the temperature (<math display="inline"><semantics> <msup> <mrow/> <mo>∘</mo> </msup> </semantics></math>C) at point “3”).</p>
Full article ">Figure 12
<p>Algorithm for conducting a series of computational experiments for a large sample of breast models and processing temperature data using artificial intelligence methods.</p>
Full article ">Figure 13
<p>Distributions of internal temperature values at point “0” according to the following classes: “Healthy” according to medical examinations (“REAL”) (<b>a</b>); dataset “REAL” if diagnosed with cancer (<b>b</b>); “Healthy” according to the results of computational experiments (dataset “SIMULATION”) (<b>c</b>); “Cancer” by dataset “SIMULATION” (<b>d</b>).</p>
Full article ">Figure 14
<p>Samples structure used in machine learning algorithms: the sizes of “REAL” and “SIMULATION” datasets (<b>a</b>), Test and Training datasets (<b>b</b>), “Healthy” and “Cancer” classes (<b>c</b>).</p>
Full article ">Figure 15
<p>Used CNN scheme for binary classification of thermometric data.</p>
Full article ">Figure 16
<p>Brightness and infrared temperature distributions of three models with different tumor sizes: (<b>a</b>,<b>e</b>) <math display="inline"><semantics> <mrow> <mi>R</mi> <mo>=</mo> <mn>1</mn> </mrow> </semantics></math> cm; (<b>b</b>,<b>f</b>) <math display="inline"><semantics> <mrow> <mi>R</mi> <mo>=</mo> <mn>0.75</mn> </mrow> </semantics></math> cm; (<b>c</b>,<b>g</b>) <math display="inline"><semantics> <mrow> <mi>R</mi> <mo>=</mo> <mn>0.5</mn> </mrow> </semantics></math> cm. The models in panels (<b>d</b>,<b>h</b>) do not contain tumors.</p>
Full article ">Figure 17
<p>Distributions of thermodynamic temperature over depth for tumors of different radii <span class="html-italic">R</span> at <math display="inline"><semantics> <mrow> <msup> <mi>Q</mi> <mrow> <mo>(</mo> <mi>c</mi> <mi>a</mi> <mi>n</mi> <mo>)</mo> </mrow> </msup> <mo>=</mo> <mn>3</mn> <mo>×</mo> <msup> <mn>10</mn> <mn>4</mn> </msup> </mrow> </semantics></math> W m<math display="inline"><semantics> <msup> <mrow/> <mrow> <mo>−</mo> <mn>3</mn> </mrow> </msup> </semantics></math>: (<b>a</b>) <span class="html-italic">R</span> = 1 cm, (<b>b</b>) <span class="html-italic">R</span> = 0.75 cm, (<b>c</b>) <span class="html-italic">R</span> = 0.5 cm, (<b>d</b>) <span class="html-italic">R</span> = 0.35 cm.</p>
Full article ">Figure 18
<p>Thermodynamic temperature distributions at different depths from the nipple on flat sections: <math display="inline"><semantics> <mrow> <msup> <mi>L</mi> <mrow> <mo>(</mo> <mi>c</mi> <mi>a</mi> <mi>n</mi> <mo>)</mo> </mrow> </msup> <mo>=</mo> <mn>2</mn> </mrow> </semantics></math> cm (<b>a</b>); <math display="inline"><semantics> <mrow> <msup> <mi>L</mi> <mrow> <mo>(</mo> <mi>c</mi> <mi>a</mi> <mi>n</mi> <mo>)</mo> </mrow> </msup> <mo>=</mo> <mn>3</mn> </mrow> </semantics></math> cm (<b>b</b>); <math display="inline"><semantics> <mrow> <msup> <mi>L</mi> <mrow> <mo>(</mo> <mi>c</mi> <mi>a</mi> <mi>n</mi> <mo>)</mo> </mrow> </msup> <mo>=</mo> <mn>4</mn> </mrow> </semantics></math> cm (<b>c</b>); <math display="inline"><semantics> <mrow> <msup> <mi>L</mi> <mrow> <mo>(</mo> <mi>c</mi> <mi>a</mi> <mi>n</mi> <mo>)</mo> </mrow> </msup> <mo>=</mo> <mn>5</mn> </mrow> </semantics></math> cm (<b>d</b>). The tumor is in the vicinity of measurement point “8”.</p>
Full article ">Figure 19
<p>The effectiveness of MWR diagnostics (<math display="inline"><semantics> <mrow> <mi>e</mi> <mi>f</mi> <mi>f</mi> </mrow> </semantics></math>) vs. the tumor radius for various machine learning methods.</p>
Full article ">Figure 20
<p>Tumor detection boundaries on the plane of parameters <span class="html-italic">R</span> ([cm]) and <math display="inline"><semantics> <msup> <mi>Q</mi> <mrow> <mo>(</mo> <mi>c</mi> <mi>a</mi> <mi>n</mi> <mo>)</mo> </mrow> </msup> </semantics></math> ([W·m<math display="inline"><semantics> <msup> <mrow/> <mrow> <mo>−</mo> <mn>3</mn> </mrow> </msup> </semantics></math>]) by different machine learning methods (blue line is SVM , green line is NBC, red line is KNN).</p>
Full article ">Figure 21
<p>The infrared (<span class="html-italic">T<sub>IR</sub></span>, (<b>a</b>)) and brightness (<span class="html-italic">T<sub>B</sub></span>, (<b>b</b>)) temperature distributions from the simulations show a characteristic bell-shaped appearance.</p>
Full article ">Figure 22
<p>Dependences of the accuracy and the loss on the epoch. The red dashed line shows the epoch when the retraining of the neural network starts.</p>
Full article ">
23 pages, 3231 KiB  
Article
Social Media Hate Speech Detection Using Explainable Artificial Intelligence (XAI)
by Harshkumar Mehta and Kalpdrum Passi
Algorithms 2022, 15(8), 291; https://doi.org/10.3390/a15080291 - 17 Aug 2022
Cited by 30 | Viewed by 7703
Abstract
Explainable artificial intelligence (XAI) characteristics have flexible and multifaceted potential in hate speech detection by deep learning models. Interpreting and explaining decisions made by complex artificial intelligence (AI) models to understand the decision-making process of these model were the aims of this research. [...] Read more.
Explainable artificial intelligence (XAI) characteristics have flexible and multifaceted potential in hate speech detection by deep learning models. Interpreting and explaining decisions made by complex artificial intelligence (AI) models to understand the decision-making process of these model were the aims of this research. As a part of this research study, two datasets were taken to demonstrate hate speech detection using XAI. Data preprocessing was performed to clean data of any inconsistencies, clean the text of the tweets, tokenize and lemmatize the text, etc. Categorical variables were also simplified in order to generate a clean dataset for training purposes. Exploratory data analysis was performed on the datasets to uncover various patterns and insights. Various pre-existing models were applied to the Google Jigsaw dataset such as decision trees, k-nearest neighbors, multinomial naïve Bayes, random forest, logistic regression, and long short-term memory (LSTM), among which LSTM achieved an accuracy of 97.6%. Explainable methods such as LIME (local interpretable model—agnostic explanations) were applied to the HateXplain dataset. Variants of BERT (bidirectional encoder representations from transformers) model such as BERT + ANN (artificial neural network) with an accuracy of 93.55% and BERT + MLP (multilayer perceptron) with an accuracy of 93.67% were created to achieve a good performance in terms of explainability using the ERASER (evaluating rationales and simple English reasoning) benchmark. Full article
(This article belongs to the Section Evolutionary Algorithms and Machine Learning)
Show Figures

Figure 1

Figure 1
<p>Data cleaning.</p>
Full article ">Figure 2
<p>Exploratory data analysis.</p>
Full article ">Figure 3
<p>LIME.</p>
Full article ">Figure 4
<p>Result summary of all classification models on the Google Jigsaw dataset.</p>
Full article ">Figure 5
<p>BERT + MLP model architecture.</p>
Full article ">Figure 6
<p>BERT + ANN model architecture.</p>
Full article ">Figure 7
<p>Explainability with random forest.</p>
Full article ">Figure 8
<p>Explainability with Gaussian naïve Bayes.</p>
Full article ">Figure 9
<p>Explainability with decision tree.</p>
Full article ">Figure 10
<p>Explainability with logistic regression.</p>
Full article ">Figure 11
<p>Result summary of all models on the HateXplain dataset.</p>
Full article ">
17 pages, 2157 KiB  
Article
Discrete-Time Observations of Brownian Motion on Lie Groups and Homogeneous Spaces: Sampling and Metric Estimation
by Mathias Højgaard Jensen, Sarang Joshi and Stefan Sommer
Algorithms 2022, 15(8), 290; https://doi.org/10.3390/a15080290 - 17 Aug 2022
Viewed by 1814
Abstract
We present schemes for simulating Brownian bridges on complete and connected Lie groups and homogeneous spaces. We use this to construct an estimation scheme for recovering an unknown left- or right-invariant Riemannian metric on the Lie group from samples. We subsequently show how [...] Read more.
We present schemes for simulating Brownian bridges on complete and connected Lie groups and homogeneous spaces. We use this to construct an estimation scheme for recovering an unknown left- or right-invariant Riemannian metric on the Lie group from samples. We subsequently show how pushing forward the distributions generated by Brownian motions on the group results in distributions on homogeneous spaces that exhibit a non-trivial covariance structure. The pushforward measure gives rise to new non-parametric families of distributions on commonly occurring spaces such as spheres and symmetric positive tensors. We extend the estimation scheme to fit these distributions to homogeneous space-valued data. We demonstrate both the simulation schemes and estimation procedures on Lie groups and homogenous spaces, including SPD(3)=GL+(3)/SO(3) and S2=SO(3)/SO(2). Full article
Show Figures

Figure 1

Figure 1
<p>The two leftmost plots visualize the transition densities of (<b>a</b>) a Fisher–Bingham–Kent distribution and (<b>b</b>) the pushforward density of a Brownian motion to <math display="inline"><semantics> <msup> <mi mathvariant="double-struck">S</mi> <mn>2</mn> </msup> </semantics></math> with a bi-invariant metric. The pushforward measure of a Brownian motion on <math display="inline"><semantics> <mrow> <mi>SO</mi> <mo>(</mo> <mn>3</mn> <mo>)</mo> </mrow> </semantics></math> to the sphere <math display="inline"><semantics> <msup> <mi mathvariant="double-struck">S</mi> <mn>2</mn> </msup> </semantics></math> results in anisotropic distributions on <math display="inline"><semantics> <msup> <mi mathvariant="double-struck">S</mi> <mn>2</mn> </msup> </semantics></math> when the metric on <math display="inline"><semantics> <mrow> <mi>SO</mi> <mo>(</mo> <mn>3</mn> <mo>)</mo> </mrow> </semantics></math> is not bi-invariant, for (<b>c</b>) <math display="inline"><semantics> <mrow> <mi>T</mi> <mo>=</mo> <mn>0.5</mn> </mrow> </semantics></math> and (<b>d</b>) <math display="inline"><semantics> <mrow> <mi>T</mi> <mo>=</mo> <mn>1.0</mn> </mrow> </semantics></math>. The coloring indicates the density of the pushforward (different color scheme for each subfigure).</p>
Full article ">Figure 2
<p>One sample path of the guided bridge process (<a href="#FD13-algorithms-15-00290" class="html-disp-formula">13</a>) on <math display="inline"><semantics> <mrow> <mi>SO</mi> <mo>(</mo> <mn>3</mn> <mo>)</mo> </mrow> </semantics></math> visualized by its action on the basis vectors (red, blue, green) of <math display="inline"><semantics> <msup> <mi mathvariant="double-struck">R</mi> <mn>3</mn> </msup> </semantics></math>. The bridge is conditioned on the rotation indicated by the black arrows.</p>
Full article ">Figure 3
<p>Angle–axis representation of the guided bridge defined by (<a href="#FD13-algorithms-15-00290" class="html-disp-formula">13</a>). (<b>Left</b>) The projection of the path in <math display="inline"><semantics> <mrow> <mi>SO</mi> <mo>(</mo> <mn>3</mn> <mo>)</mo> </mrow> </semantics></math> to <math display="inline"><semantics> <msup> <mi mathvariant="double-struck">S</mi> <mn>2</mn> </msup> </semantics></math>. The trajectory on <math display="inline"><semantics> <msup> <mi mathvariant="double-struck">S</mi> <mn>2</mn> </msup> </semantics></math> corresponds to the motion of the tip of the blue vector, as seen in <a href="#algorithms-15-00290-f002" class="html-fig">Figure 2</a>. (<b>Right</b>) The angle representation of the guided bridge in <math display="inline"><semantics> <mrow> <mi>SO</mi> <mo>(</mo> <mn>3</mn> <mo>)</mo> </mrow> </semantics></math>.</p>
Full article ">Figure 4
<p>The importance sampling technique applies to estimate the metric on the Lie group <math display="inline"><semantics> <mrow> <mi>SO</mi> <mo>(</mo> <mn>3</mn> <mo>)</mo> </mrow> </semantics></math>. Sampling a Brownian motion from an underlying unknown metric, we obtain convergence to the true underlying metric using an iterative MLE method. Here, we sampled four guided bridges per observation, providing a relatively smooth iterative likelihood. (<b>Top left</b>) Estimation of the unknown underlying metric using bridge sampling, starting from the metric <math display="inline"><semantics> <mrow> <mi>diag</mi> <mo>(</mo> <mn>1</mn> <mo>,</mo> <mn>1</mn> <mo>,</mo> <mn>1</mn> <mo>)</mo> </mrow> </semantics></math>. Here, the true metric is the diagonal matrix <math display="inline"><semantics> <mrow> <mi>diag</mi> <mo>(</mo> <mn>0.2</mn> <mo>,</mo> <mn>0.2</mn> <mo>,</mo> <mn>0.8</mn> <mo>)</mo> </mrow> </semantics></math> represented by the red lines. The diagonal is represented by the colors diag (purple, blue, yellow). (<b>Top right</b>) The corresponding log-likelihood evolution through the iterations. (<b>Bottom left</b>) Estimation of the unknown underlying metric using bridge sampling, starting from the metric <math display="inline"><semantics> <mrow> <mi>diag</mi> <mo>(</mo> <mn>0.5</mn> <mo>,</mo> <mn>0.5</mn> <mo>,</mo> <mn>0.5</mn> <mo>)</mo> </mrow> </semantics></math>. (<b>Bottom right</b>) The corresponding iterative log-likelihood.</p>
Full article ">Figure 5
<p>Discrete-time observations from three sample paths on <math display="inline"><semantics> <mrow> <mo form="prefix">SPD</mo> <mo>(</mo> <mn>3</mn> <mo>)</mo> </mrow> </semantics></math>. The sample paths are obtained as the pushforward of the Fermi bridge in <math display="inline"><semantics> <mrow> <msub> <mi>GL</mi> <mo>+</mo> </msub> <mrow> <mo>(</mo> <mn>3</mn> <mo>)</mo> </mrow> </mrow> </semantics></math>. The start and endpoint are the left- and rightmost figures, where the SPD matrices are indicated by the bold face arrows.</p>
Full article ">Figure 6
<p>Given 256 data points in <math display="inline"><semantics> <mrow> <mo form="prefix">SPD</mo> <mo>(</mo> <mn>3</mn> <mo>)</mo> </mrow> </semantics></math>, we estimated the diffusion mean on the homogeneous space by sampling bridges in the top space conditioned on the fibers. The iterative MLE in Algorithm 1 yielded the convergence of the diffusion mean parameter, using a learning rate of <math display="inline"><semantics> <mrow> <mn>0.005</mn> </mrow> </semantics></math> and one bridge sample per observation. (<b>Left</b>) The purple, blue, and yellow lines correspond to the diagonal of the metric matrix, whereas the remaining colors represent the off-diagonal. The true mean value is the identity matrix indicated by the red lines. (<b>Right</b>) The corresponding log-likelihood evolution through the iterations.</p>
Full article ">
15 pages, 678 KiB  
Article
Biased-Randomized Discrete-Event Heuristics for Dynamic Optimization with Time Dependencies and Synchronization
by Juliana Castaneda, Mattia Neroni, Majsa Ammouriova, Javier Panadero and Angel A. Juan
Algorithms 2022, 15(8), 289; https://doi.org/10.3390/a15080289 - 16 Aug 2022
Cited by 3 | Viewed by 1884
Abstract
Many real-life combinatorial optimization problems are subject to a high degree of dynamism, while, simultaneously, a certain level of synchronization among agents and events is required. Thus, for instance, in ride-sharing operations, the arrival of vehicles at pick-up points needs to be synchronized [...] Read more.
Many real-life combinatorial optimization problems are subject to a high degree of dynamism, while, simultaneously, a certain level of synchronization among agents and events is required. Thus, for instance, in ride-sharing operations, the arrival of vehicles at pick-up points needs to be synchronized with the times at which users reach these locations so that waiting times do not represent an issue. Likewise, in warehouse logistics, the availability of automated guided vehicles at an entry point needs to be synchronized with the arrival of new items to be stored. In many cases, as operational decisions are made, a series of interdependent events are scheduled for the future, thus making the synchronization task one that traditional optimization methods cannot handle easily. On the contrary, discrete-event simulation allows for processing a complex list of scheduled events in a natural way, although the optimization component is missing here. This paper discusses a hybrid approach in which a heuristic is driven by a list of discrete events and then extended into a biased-randomized algorithm. As the paper discusses in detail, the proposed hybrid approach allows us to efficiently tackle optimization problems with complex synchronization issues. Full article
Show Figures

Figure 1

Figure 1
<p>A simple example of a dynamic optimization problem with synchronization issues.</p>
Full article ">Figure 2
<p>Number of articles indexed in Scopus for the main topics addressed in this article.</p>
Full article ">Figure 3
<p>Flow-chart illustrating the discrete event simulation running.</p>
Full article ">Figure 4
<p>Flow-chart illustrating the DEH concept.</p>
Full article ">Figure 5
<p>Schematic representation of SLC-AS/RS elements.</p>
Full article ">Figure 6
<p>Results of the DEH on the SLC-AS/RS.</p>
Full article ">Figure 7
<p>Computational times of the DEH on the SLC-AS/RS.</p>
Full article ">Figure 8
<p>Gaps between OBS and BKS (baseline <math display="inline"><semantics> <mrow> <mn>0</mn> <mo>%</mo> </mrow> </semantics></math> gap).</p>
Full article ">
15 pages, 9279 KiB  
Article
A Coupled Variational System for Image Decomposition along with Edges Detection
by Jianlou Xu, Yuying Guo, Yan Hao and Leigang Huo
Algorithms 2022, 15(8), 288; https://doi.org/10.3390/a15080288 - 16 Aug 2022
Viewed by 1653
Abstract
In order to better decompose the images and protect their edges, in this paper, we proposed a coupled variational system consisting of two steps. The first step, an improved weighted variational model is introduced to obtain the cartoon and texture. Using the obtained [...] Read more.
In order to better decompose the images and protect their edges, in this paper, we proposed a coupled variational system consisting of two steps. The first step, an improved weighted variational model is introduced to obtain the cartoon and texture. Using the obtained cartoon image, in the second step, a new vector function is obtained for describing the pseudo edge of the considered image by one Tikhonov regularization variational model. Because Tikhonov regularization model is equivalent to carrying out a Gaussian linear filtering, the obtained vector function is smoother. To solve the coupled system, we give the alternating direction method, primal-dual method and Gauss-Seidel iteration. Using the coupled system, we can not only separate out the cartoon and texture parts, but also extract the edge. Extensive numerical experiments are given to show the effectiveness of the proposed method compared with other variational methods. Full article
(This article belongs to the Special Issue Young Researchers in Imaging Science: Modelling and Algorithms)
Show Figures

Figure 1

Figure 1
<p>Results for different <math display="inline"><semantics> <mi>K</mi> </semantics></math>. (<b>a</b>) <math display="inline"><semantics> <mrow> <mi>K</mi> <mo>=</mo> <mn>0.1</mn> </mrow> </semantics></math>; (<b>b</b>) <math display="inline"><semantics> <mrow> <mi>K</mi> <mo>=</mo> <mn>0.01</mn> </mrow> </semantics></math>; (<b>c</b>) <math display="inline"><semantics> <mrow> <mi>K</mi> <mo>=</mo> <mn>0.001</mn> </mrow> </semantics></math>; (<b>d</b>) <math display="inline"><semantics> <mrow> <mi>K</mi> <mo>=</mo> <mn>0.0001</mn> </mrow> </semantics></math>.</p>
Full article ">Figure 1 Cont.
<p>Results for different <math display="inline"><semantics> <mi>K</mi> </semantics></math>. (<b>a</b>) <math display="inline"><semantics> <mrow> <mi>K</mi> <mo>=</mo> <mn>0.1</mn> </mrow> </semantics></math>; (<b>b</b>) <math display="inline"><semantics> <mrow> <mi>K</mi> <mo>=</mo> <mn>0.01</mn> </mrow> </semantics></math>; (<b>c</b>) <math display="inline"><semantics> <mrow> <mi>K</mi> <mo>=</mo> <mn>0.001</mn> </mrow> </semantics></math>; (<b>d</b>) <math display="inline"><semantics> <mrow> <mi>K</mi> <mo>=</mo> <mn>0.0001</mn> </mrow> </semantics></math>.</p>
Full article ">Figure 2
<p>The test images. (<b>a</b>) Synthesis image; (<b>b</b>) Fabric image; (<b>c</b>) Barbara image; (<b>d</b>) Table image; (<b>e</b>) Tom image; (<b>f</b>) Boy image.</p>
Full article ">Figure 3
<p>The decomposition results using different algorithms. From left to right: (<b>a</b>) Cartoon and texture obtained by [<a href="#B4-algorithms-15-00288" class="html-bibr">4</a>]. (<b>b</b>) Cartoon and texture obtained by [<a href="#B8-algorithms-15-00288" class="html-bibr">8</a>]. (<b>c</b>) Cartoon and texture obtained by [<a href="#B18-algorithms-15-00288" class="html-bibr">18</a>]. (<b>d</b>) Cartoon, the pseudo edge and texture obtained by [<a href="#B40-algorithms-15-00288" class="html-bibr">40</a>]. (<b>e</b>) Cartoon, the pseudo edge <math display="inline"><semantics> <mrow> <mrow> <mo>|</mo> <mi>ω</mi> <mo>|</mo> </mrow> </mrow> </semantics></math> and texture obtained by the proposed method.</p>
Full article ">Figure 3 Cont.
<p>The decomposition results using different algorithms. From left to right: (<b>a</b>) Cartoon and texture obtained by [<a href="#B4-algorithms-15-00288" class="html-bibr">4</a>]. (<b>b</b>) Cartoon and texture obtained by [<a href="#B8-algorithms-15-00288" class="html-bibr">8</a>]. (<b>c</b>) Cartoon and texture obtained by [<a href="#B18-algorithms-15-00288" class="html-bibr">18</a>]. (<b>d</b>) Cartoon, the pseudo edge and texture obtained by [<a href="#B40-algorithms-15-00288" class="html-bibr">40</a>]. (<b>e</b>) Cartoon, the pseudo edge <math display="inline"><semantics> <mrow> <mrow> <mo>|</mo> <mi>ω</mi> <mo>|</mo> </mrow> </mrow> </semantics></math> and texture obtained by the proposed method.</p>
Full article ">Figure 4
<p>The decomposition results using different algorithms. From left to right: (<b>a</b>) Cartoon, texture and the module of gradient for the cartoon obtained by [<a href="#B8-algorithms-15-00288" class="html-bibr">8</a>]. (<b>b</b>) Cartoon, texture and the pseudo edge obtained by [<a href="#B39-algorithms-15-00288" class="html-bibr">39</a>]. (<b>c</b>) Cartoon, texture and the pseudo edge obtained by [<a href="#B40-algorithms-15-00288" class="html-bibr">40</a>]. (<b>d</b>) Cartoon, texture and the pseudo edge <math display="inline"><semantics> <mrow> <mrow> <mo>|</mo> <mi>ω</mi> <mo>|</mo> </mrow> </mrow> </semantics></math> obtained by the proposed method.</p>
Full article ">Figure 4 Cont.
<p>The decomposition results using different algorithms. From left to right: (<b>a</b>) Cartoon, texture and the module of gradient for the cartoon obtained by [<a href="#B8-algorithms-15-00288" class="html-bibr">8</a>]. (<b>b</b>) Cartoon, texture and the pseudo edge obtained by [<a href="#B39-algorithms-15-00288" class="html-bibr">39</a>]. (<b>c</b>) Cartoon, texture and the pseudo edge obtained by [<a href="#B40-algorithms-15-00288" class="html-bibr">40</a>]. (<b>d</b>) Cartoon, texture and the pseudo edge <math display="inline"><semantics> <mrow> <mrow> <mo>|</mo> <mi>ω</mi> <mo>|</mo> </mrow> </mrow> </semantics></math> obtained by the proposed method.</p>
Full article ">Figure 5
<p>The decomposition results using different algorithms. From left to right: (<b>a</b>) Cartoon and texture [<a href="#B5-algorithms-15-00288" class="html-bibr">5</a>]. (<b>b</b>) Cartoon and texture obtained by [<a href="#B26-algorithms-15-00288" class="html-bibr">26</a>]. (<b>c</b>) Cartoon and texture obtained by [<a href="#B15-algorithms-15-00288" class="html-bibr">15</a>]. (<b>d</b>) Cartoon, texture and the pseudo edge obtained by [<a href="#B40-algorithms-15-00288" class="html-bibr">40</a>]. (<b>e</b>) Cartoon, texture and the pseudo edge <math display="inline"><semantics> <mrow> <mrow> <mo>|</mo> <mi>ω</mi> <mo>|</mo> </mrow> </mrow> </semantics></math> obtained by the proposed method.</p>
Full article ">Figure 5 Cont.
<p>The decomposition results using different algorithms. From left to right: (<b>a</b>) Cartoon and texture [<a href="#B5-algorithms-15-00288" class="html-bibr">5</a>]. (<b>b</b>) Cartoon and texture obtained by [<a href="#B26-algorithms-15-00288" class="html-bibr">26</a>]. (<b>c</b>) Cartoon and texture obtained by [<a href="#B15-algorithms-15-00288" class="html-bibr">15</a>]. (<b>d</b>) Cartoon, texture and the pseudo edge obtained by [<a href="#B40-algorithms-15-00288" class="html-bibr">40</a>]. (<b>e</b>) Cartoon, texture and the pseudo edge <math display="inline"><semantics> <mrow> <mrow> <mo>|</mo> <mi>ω</mi> <mo>|</mo> </mrow> </mrow> </semantics></math> obtained by the proposed method.</p>
Full article ">Figure 6
<p>Table decomposition experiment. From left to right: (<b>a</b>) cartoon, texture with [<a href="#B8-algorithms-15-00288" class="html-bibr">8</a>]; (<b>b</b>) cartoon, texture with [<a href="#B26-algorithms-15-00288" class="html-bibr">26</a>]; (<b>c</b>) cartoon, texture with [<a href="#B12-algorithms-15-00288" class="html-bibr">12</a>]; (<b>d</b>) cartoon, texture and the pseudo edge with [<a href="#B40-algorithms-15-00288" class="html-bibr">40</a>]; (<b>e</b>) cartoon, texture and the pseudo edge <math display="inline"><semantics> <mrow> <mrow> <mo>|</mo> <mi>ω</mi> <mo>|</mo> </mrow> </mrow> </semantics></math> obtained by the proposed method.</p>
Full article ">Figure 6 Cont.
<p>Table decomposition experiment. From left to right: (<b>a</b>) cartoon, texture with [<a href="#B8-algorithms-15-00288" class="html-bibr">8</a>]; (<b>b</b>) cartoon, texture with [<a href="#B26-algorithms-15-00288" class="html-bibr">26</a>]; (<b>c</b>) cartoon, texture with [<a href="#B12-algorithms-15-00288" class="html-bibr">12</a>]; (<b>d</b>) cartoon, texture and the pseudo edge with [<a href="#B40-algorithms-15-00288" class="html-bibr">40</a>]; (<b>e</b>) cartoon, texture and the pseudo edge <math display="inline"><semantics> <mrow> <mrow> <mo>|</mo> <mi>ω</mi> <mo>|</mo> </mrow> </mrow> </semantics></math> obtained by the proposed method.</p>
Full article ">Figure 7
<p>Tom decomposition experiment. From left to right: (<b>a</b>) cartoon, texture and the pseudo edge with [<a href="#B39-algorithms-15-00288" class="html-bibr">39</a>]; (<b>b</b>) cartoon, texture and the pseudo edge with [<a href="#B40-algorithms-15-00288" class="html-bibr">40</a>]; (<b>c</b>) cartoon, texture and the pseudo edge with [<a href="#B11-algorithms-15-00288" class="html-bibr">11</a>]; (<b>d</b>) cartoon, texture and the pseudo edge <math display="inline"><semantics> <mrow> <mrow> <mo>|</mo> <mi>ω</mi> <mo>|</mo> </mrow> </mrow> </semantics></math> obtained by the proposed method.</p>
Full article ">Figure 7 Cont.
<p>Tom decomposition experiment. From left to right: (<b>a</b>) cartoon, texture and the pseudo edge with [<a href="#B39-algorithms-15-00288" class="html-bibr">39</a>]; (<b>b</b>) cartoon, texture and the pseudo edge with [<a href="#B40-algorithms-15-00288" class="html-bibr">40</a>]; (<b>c</b>) cartoon, texture and the pseudo edge with [<a href="#B11-algorithms-15-00288" class="html-bibr">11</a>]; (<b>d</b>) cartoon, texture and the pseudo edge <math display="inline"><semantics> <mrow> <mrow> <mo>|</mo> <mi>ω</mi> <mo>|</mo> </mrow> </mrow> </semantics></math> obtained by the proposed method.</p>
Full article ">Figure 8
<p>Boy decomposition experiment. From left to right: (<b>a</b>) cartoon, texture and the pseudo edge with [<a href="#B39-algorithms-15-00288" class="html-bibr">39</a>]; (<b>b</b>) cartoon, texture and the pseudo edge with [<a href="#B40-algorithms-15-00288" class="html-bibr">40</a>]; (<b>c</b>) cartoon, texture and the pseudo edge with [<a href="#B11-algorithms-15-00288" class="html-bibr">11</a>]; (<b>d</b>) cartoon, texture and the pseudo edge <math display="inline"><semantics> <mrow> <mrow> <mo>|</mo> <mi>ω</mi> <mo>|</mo> </mrow> </mrow> </semantics></math> obtained by the proposed method.</p>
Full article ">Figure 8 Cont.
<p>Boy decomposition experiment. From left to right: (<b>a</b>) cartoon, texture and the pseudo edge with [<a href="#B39-algorithms-15-00288" class="html-bibr">39</a>]; (<b>b</b>) cartoon, texture and the pseudo edge with [<a href="#B40-algorithms-15-00288" class="html-bibr">40</a>]; (<b>c</b>) cartoon, texture and the pseudo edge with [<a href="#B11-algorithms-15-00288" class="html-bibr">11</a>]; (<b>d</b>) cartoon, texture and the pseudo edge <math display="inline"><semantics> <mrow> <mrow> <mo>|</mo> <mi>ω</mi> <mo>|</mo> </mrow> </mrow> </semantics></math> obtained by the proposed method.</p>
Full article ">
17 pages, 3390 KiB  
Article
CNN Based on Transfer Learning Models Using Data Augmentation and Transformation for Detection of Concrete Crack
by Md. Monirul Islam, Md. Belal Hossain, Md. Nasim Akhtar, Mohammad Ali Moni and Khondokar Fida Hasan
Algorithms 2022, 15(8), 287; https://doi.org/10.3390/a15080287 - 15 Aug 2022
Cited by 48 | Viewed by 5859
Abstract
Cracks in concrete cause initial structural damage to civil infrastructures such as buildings, bridges, and highways, which in turn causes further damage and is thus regarded as a serious safety concern. Early detection of it can assist in preventing further damage and can [...] Read more.
Cracks in concrete cause initial structural damage to civil infrastructures such as buildings, bridges, and highways, which in turn causes further damage and is thus regarded as a serious safety concern. Early detection of it can assist in preventing further damage and can enable safety in advance by avoiding any possible accident caused while using those infrastructures. Machine learning-based detection is gaining favor over time-consuming classical detection approaches that can only fulfill the objective of early detection. To identify concrete surface cracks from images, this research developed a transfer learning approach (TL) based on Convolutional Neural Networks (CNN). This work employs the transfer learning strategy by leveraging four existing deep learning (DL) models named VGG16, ResNet18, DenseNet161, and AlexNet with pre-trained (trained on ImageNet) weights. To validate the performance of each model, four performance indicators are used: accuracy, recall, precision, and F1-score. Using the publicly available CCIC dataset, the suggested technique on AlexNet outperforms existing models with a testing accuracy of 99.90%, precision of 99.92%, recall of 99.80%, and F1-score of 99.86% for crack class. Our approach is further validated by using an external dataset, BWCI, available on Kaggle. Using BWCI, models VGG16, ResNet18, DenseNet161, and AlexNet achieved the accuracy of 99.90%, 99.60%, 99.80%, and 99.90% respectively. This proposed transfer learning-based method, which is based on the CNN method, is demonstrated to be more effective at detecting cracks in concrete structures and is also applicable to other detection tasks. Full article
(This article belongs to the Special Issue Artificial Intelligence in Modeling and Simulation)
Show Figures

Figure 1

Figure 1
<p>A block diagram of the proposed methodology.</p>
Full article ">Figure 2
<p>Sample crack and non-crack images of the CCIC dataset.</p>
Full article ">Figure 3
<p>Example of Random Resized Crop transformation. (Left is the original image).</p>
Full article ">Figure 4
<p>Example of Random Rotation transformation. (Left is the original image).</p>
Full article ">Figure 5
<p>Example of Color Jitter transformation. (Left is the original image).</p>
Full article ">Figure 6
<p>Example of Random Horizontal Flip transformation. (Left is the original image).</p>
Full article ">Figure 7
<p>VGG16 and TL VGG16 architectures.</p>
Full article ">Figure 8
<p>ResNet18 and TL ResNet18 architecture.</p>
Full article ">Figure 9
<p>DenseNet161 and TL DenseNet161 architectures.</p>
Full article ">Figure 10
<p>AlexNet and TL AlexNet architecture.</p>
Full article ">Figure 11
<p>Loss and accuracy of all TL models both in Train and validation.</p>
Full article ">Figure 12
<p>Confusion matrix of TL VGG16, TL ResNet18, TL DenseNet161, and TL AlexNet.</p>
Full article ">Figure 13
<p>ROC curve of different TL models.</p>
Full article ">Figure 14
<p>PR curve of different TL models.</p>
Full article ">Figure 15
<p>Sample crack and non-crack images of external dataset.</p>
Full article ">
12 pages, 10060 KiB  
Article
Temari Balls, Spheres, SphereHarmonic: From Japanese Folkcraft to Music
by Maria Mannone and Takashi Yoshino
Algorithms 2022, 15(8), 286; https://doi.org/10.3390/a15080286 - 14 Aug 2022
Viewed by 3338
Abstract
Temari balls are traditional Japanese toys and artworks. The variety of their geometries and tessellations can be investigated formally and computationally with the means of combinatorics. As a further step, we also propose a musical application of the core idea of Temari balls. [...] Read more.
Temari balls are traditional Japanese toys and artworks. The variety of their geometries and tessellations can be investigated formally and computationally with the means of combinatorics. As a further step, we also propose a musical application of the core idea of Temari balls. In fact, inspired by the classical idea of music of spheres and by the CubeHarmonic, a musical application of the Rubik’s cube, we present the concept of a new musical instrument, the SphereHarmonic. The mathematical (and musical) description of Temari balls lies in the wide background of interactions between art and combinatorics. Concerning the methods, we present the tools of permutations and tessellations we adopted here, and the core idea for the SphereHarmonic. As the results, we first describe a classification of structures according to the theory of groups. Then, we summarize the main passages implemented in our code, to make the SphereHarmonic play on a laptop. Our study explores an aspect of the deep connections between the mutually inspiring scientific and artistic thinking. Full article
(This article belongs to the Special Issue Combinatorial Designs: Theory and Applications)
Show Figures

Figure 1

Figure 1
<p>A collection of Temari balls. Credits: Wikipedia, user Σ 64, license CC BY 4.0.</p>
Full article ">Figure 2
<p>The prototype of <span class="html-italic">CubeHarmonic</span> developed at the Tohoku University, with the IM3D platform and a virtual-reality screen. Detail from a video’s photogram. Video by M. Mannone with Kitamura Lab. CC-BY license for NIME conference.</p>
Full article ">Figure 3
<p>(<b>a</b>–<b>d</b>):Traditional basic divisions (S8, C6, C8, and C10, from left to right). Large marks on the top denote poles. (<b>a’</b>–<b>d’</b>): Spherical patterns corresponding to (<b>a</b>–<b>d</b>). (<b>e’</b>): A simple textured triangular unit used to construct spherical patterns (<b>a’</b>–<b>d’</b>).</p>
Full article ">Figure 4
<p>Schematic illustration of a part of a Coxeter print {<span class="html-italic">p</span>, <span class="html-italic">q</span>, <span class="html-italic">r</span>}.</p>
Full article ">Figure 5
<p>One-to-one correspondence between Coxeter prints and Temari basic divisions.</p>
Full article ">Figure 6
<p>Correspondences between Platonic and spherical polyhedra.</p>
Full article ">Figure 7
<p>Schematic illustration of a stereographic projection of a spherical surface.</p>
Full article ">Figure 8
<p>Stereographic projections of Temari basic divisions.</p>
Full article ">Figure 9
<p>Representation of sequential rotations of the hemispheres of C8. L stands for “lower”, and U for “upper”.</p>
Full article ">Figure 10
<p>Image of the prototype of <span class="html-italic">SphereHarmonic</span> C8.</p>
Full article ">
17 pages, 1176 KiB  
Article
Fast Conflict Detection for Multi-Dimensional Packet Filters
by Chun-Liang Lee, Guan-Yu Lin and Yaw-Chung Chen
Algorithms 2022, 15(8), 285; https://doi.org/10.3390/a15080285 - 14 Aug 2022
Cited by 1 | Viewed by 1758
Abstract
To support advanced network services, Internet routers must perform packet classification based on a set of rules called packet filters. If two or more filters overlap, a filter conflict will occur and lead to ambiguity in packet classification. Further, it may affect network [...] Read more.
To support advanced network services, Internet routers must perform packet classification based on a set of rules called packet filters. If two or more filters overlap, a filter conflict will occur and lead to ambiguity in packet classification. Further, it may affect network security or even the correctness of packet routing. Hence, it is necessary to detect conflicts to avoid the above problems. In recent years, many conflict detection algorithms have been proposed, but most of them detect conflicts for only prefix fields (i.e., source/destination IP address fields) of filters. For greater practicality, conflict detection must include non-prefix fields such as source/destination IP port fields and the protocol field. In this study, we propose an efficient conflict detection algorithm for five-dimensional filters, which include both prefix and non-prefix fields. In the proposed algorithm, a tiny lookup table is created for quickly filtering out a large portion of non-conflicting filter pairs, thereby reducing the overall conflict detection time. Experimental results show that our algorithm reduces the detection time by 10% to 28% compared with other conflict detection algorithms for 20 K filter databases. More importantly, our algorithm can be used to extend any existing conflict detection algorithms for two-dimensional filters to support fast conflict detection for five-dimensional filters. Full article
(This article belongs to the Special Issue Algorithms for Communication Networks)
Show Figures

Figure 1

Figure 1
<p>Rectangular presentation of filters.</p>
Full article ">Figure 2
<p>Five results of combined comparison.</p>
Full article ">Figure 3
<p>The process flow of 5D conflict detection.</p>
Full article ">
32 pages, 1318 KiB  
Article
A Vibration Based Automatic Fault Detection Scheme for Drilling Process Using Type-2 Fuzzy Logic
by Satyam Paul, Rob Turnbull, Davood Khodadad and Magnus Löfstrand
Algorithms 2022, 15(8), 284; https://doi.org/10.3390/a15080284 - 12 Aug 2022
Cited by 7 | Viewed by 1754
Abstract
The fault detection system using automated concepts is a crucial aspect of the industrial process. The automated system can contribute efficiently in minimizing equipment downtime therefore improving the production process cost. This paper highlights a novel model based fault detection (FD) approach combined [...] Read more.
The fault detection system using automated concepts is a crucial aspect of the industrial process. The automated system can contribute efficiently in minimizing equipment downtime therefore improving the production process cost. This paper highlights a novel model based fault detection (FD) approach combined with an interval type-2 (IT2) Takagi–Sugeno (T–S) fuzzy system for fault detection in the drilling process. The system uncertainty is considered prevailing during the process, and type-2 fuzzy methodology is utilized to deal with these uncertainties in an effective way. Two theorems are developed; Theorem 1, which proves the stability of the fuzzy modeling, and Theorem 2, which establishes the fault detector algorithm stability. A Lyapunov stabilty analysis is implemented for validating the stability criterion for Theorem 1 and Theorem 2. In order to validate the effective implementation of the complex theoretical approach, a numerical analysis is carried out at the end. The proposed methodology can be implemented in real time to detect faults in the drilling tool maintaining the stability of the proposed fault detection estimator. This is critical for increasing the productivity and quality of the machining process, and it also helps improve the surface finish of the work piece satisfying the customer needs and expectations. Full article
Show Figures

Figure 1

Figure 1
<p>Three modes of vibration (4 DOF) in drilling tools.</p>
Full article ">Figure 2
<p>Block diagram of drilling simulation without fault.</p>
Full article ">Figure 3
<p>Block diagram of drilling simulation with induced fault.</p>
Full article ">Figure 4
<p><span class="html-italic">x</span>-axis representation of cutting force.</p>
Full article ">Figure 5
<p><span class="html-italic">y</span>-axis representation of cutting force.</p>
Full article ">Figure 6
<p>Drilling Tool vibration along the x-direction.</p>
Full article ">Figure 7
<p>Drill Tool vibration along the y-direction.</p>
Full article ">Figure 8
<p>Drilling Tool vibration along the x-direction with the induced fault.</p>
Full article ">Figure 9
<p>Drilling Tool vibration along the y-direction with induced fault.</p>
Full article ">Figure 10
<p>Fault detection scheme along the <span class="html-italic">x</span>-axis.</p>
Full article ">Figure 11
<p>Fault detection scheme along the <span class="html-italic">y</span>-axis.</p>
Full article ">
27 pages, 1546 KiB  
Review
Adversarial Training Methods for Deep Learning: A Systematic Review
by Weimin Zhao, Sanaa Alwidian and Qusay H. Mahmoud
Algorithms 2022, 15(8), 283; https://doi.org/10.3390/a15080283 - 12 Aug 2022
Cited by 32 | Viewed by 14449
Abstract
Deep neural networks are exposed to the risk of adversarial attacks via the fast gradient sign method (FGSM), projected gradient descent (PGD) attacks, and other attack algorithms. Adversarial training is one of the methods used to defend against the threat of adversarial attacks. [...] Read more.
Deep neural networks are exposed to the risk of adversarial attacks via the fast gradient sign method (FGSM), projected gradient descent (PGD) attacks, and other attack algorithms. Adversarial training is one of the methods used to defend against the threat of adversarial attacks. It is a training schema that utilizes an alternative objective function to provide model generalization for both adversarial data and clean data. In this systematic review, we focus particularly on adversarial training as a method of improving the defensive capacities and robustness of machine learning models. Specifically, we focus on adversarial sample accessibility through adversarial sample generation methods. The purpose of this systematic review is to survey state-of-the-art adversarial training and robust optimization methods to identify the research gaps within this field of applications. The literature search was conducted using Engineering Village (Engineering Village is an engineering literature search tool, which provides access to 14 engineering literature and patent databases), where we collected 238 related papers. The papers were filtered according to defined inclusion and exclusion criteria, and information was extracted from these papers according to a defined strategy. A total of 78 papers published between 2016 and 2021 were selected. Data were extracted and categorized using a defined strategy, and bar plots and comparison tables were used to show the data distribution. The findings of this review indicate that there are limitations to adversarial training methods and robust optimization. The most common problems are related to data generalization and overfitting. Full article
Show Figures

Figure 1

Figure 1
<p>Conventional training of neural network model.</p>
Full article ">Figure 2
<p>Adversarial training of neural network model.</p>
Full article ">Figure 3
<p>Collection procedure.</p>
Full article ">Figure 4
<p>Distribution of the adversary generators utilized in adversarial training.</p>
Full article ">Figure 5
<p>Number of publications in each year.</p>
Full article ">Figure 6
<p>Overview of the categories of adversarial generation methods.</p>
Full article ">
27 pages, 363 KiB  
Review
Techniques and Paradigms in Modern Game AI Systems
by Yunlong Lu and Wenxin Li
Algorithms 2022, 15(8), 282; https://doi.org/10.3390/a15080282 - 12 Aug 2022
Cited by 8 | Viewed by 7147
Abstract
Games have long been benchmarks and test-beds for AI algorithms. With the development of AI techniques and the boost of computational power, modern game AI systems have achieved superhuman performance in many games played by humans. These games have various features and present [...] Read more.
Games have long been benchmarks and test-beds for AI algorithms. With the development of AI techniques and the boost of computational power, modern game AI systems have achieved superhuman performance in many games played by humans. These games have various features and present different challenges to AI research, so the algorithms used in each of these AI systems vary. This survey aims to give a systematic review of the techniques and paradigms used in modern game AI systems. By decomposing each of the recent milestones into basic components and comparing them based on the features of games, we summarize the common paradigms to build game AI systems and their scope and limitations. We claim that deep reinforcement learning is the most general methodology to become a mainstream method for games with higher complexity. We hope this survey can both provide a review of game AI algorithms and bring inspiration to the game AI community for future directions. Full article
(This article belongs to the Special Issue Algorithms for Games AI)
Show Figures

Figure 1

Figure 1
<p>Timeline of different AI techniques to build game-playing agents. Colors indicate the type of games each algorithm tackles, green for games with perfect information, yellow for games with imperfect information, and blue for multi-agent games.</p>
Full article ">
22 pages, 3781 KiB  
Article
Automated Pixel-Level Deep Crack Segmentation on Historical Surfaces Using U-Net Models
by Esraa Elhariri, Nashwa El-Bendary and Shereen A. Taie
Algorithms 2022, 15(8), 281; https://doi.org/10.3390/a15080281 - 11 Aug 2022
Cited by 5 | Viewed by 2655
Abstract
Crack detection on historical surfaces is of significant importance for credible and reliable inspection in heritage structural health monitoring. Thus, several object detection deep learning models are utilized for crack detection. However, the majority of these models are powerful at most in achieving [...] Read more.
Crack detection on historical surfaces is of significant importance for credible and reliable inspection in heritage structural health monitoring. Thus, several object detection deep learning models are utilized for crack detection. However, the majority of these models are powerful at most in achieving the task of classification, with primitive detection of the crack location. On the other hand, several state-of-the-art studies have proven that pixel-level crack segmentation can powerfully locate objects in images for more accurate and reasonable classification. In order to realize pixel-level deep crack segmentation in images of historical buildings, this paper proposes an automated deep crack segmentation approach designed based on an exhaustive investigation of several U-Net deep learning network architectures. The utilization of pixel-level crack segmentation with U-Net deep learning ensures the identification of pixels that are important for the decision of image classification. Moreover, the proposed approach employs the deep learned features extracted by the U-Net deep learning model to precisely describe crack characteristics for better pixel-level crack segmentation. A primary image dataset of various crack types and severity is collected from historical building surfaces and used for training and evaluating the performance of the proposed approach. Three variants of the U-Net convolutional network architecture are considered for the deep pixel-level segmentation of different types of cracks on historical surfaces. Promising results of the proposed approach using the U2Net deep learning model are obtained, with a Dice score and mean Intersection over Union (mIoU) of 71.09% and 78.38% achieved, respectively, at the pixel level. Conclusively, the significance of this work is the investigation of the impact of utilizing pixel-level deep crack segmentation, supported by deep learned features, through adopting variants of the U-Net deep learning model for crack detection on historical surfaces. Full article
(This article belongs to the Special Issue Algorithms for Feature Selection)
Show Figures

Figure 1

Figure 1
<p>Historical building surface examples.</p>
Full article ">Figure 2
<p>Structure of the proposed deep crack segmentation approach.</p>
Full article ">Figure 3
<p>Samples of cracks in the primary dataset.</p>
Full article ">Figure 4
<p>Illustration of semi-supervised GrabCut pixel-level map generation.</p>
Full article ">Figure 5
<p>Architecture of Deep Residual U-Net (ResU-Net).</p>
Full article ">Figure 6
<p>Architecture of ResU-Net++.</p>
Full article ">Figure 7
<p>Architecture of <math display="inline"><semantics> <msup> <mi>U</mi> <mn>2</mn> </msup> </semantics></math>-Net.</p>
Full article ">Figure 8
<p>General structure of RSU block.</p>
Full article ">Figure 9
<p>Training dataset samples.</p>
Full article ">Figure 10
<p>Semi-supervised GrabCut pixel-level map generation.</p>
Full article ">Figure 11
<p><math display="inline"><semantics> <msup> <mi>U</mi> <mn>2</mn> </msup> </semantics></math>-Net result samples.</p>
Full article ">Figure 12
<p>Results on several samples of the used crack detection dataset, with different patterns—group1. In each column, we present the results based on: (<b>a</b>) Blurred image with a crack, (<b>b</b>) Wide crack with a marker, (<b>c</b>) Branched crack with a flower, (<b>d</b>) Branched crack with flower (a different point of view), (<b>e</b>) Branched crack.</p>
Full article ">Figure 13
<p>Results on several samples of the used crack detection dataset, with different patterns—group-2. In each column, we present the results based on: (<b>a</b>) Blurred image with a crack, (<b>b</b>) Wide crack with a marker, (<b>c</b>) Blurred image with a crack and texture, (<b>d</b>) Blurred image with a crack, (<b>e</b>) Image with a crack inside carvings.</p>
Full article ">Figure 14
<p>Results on several samples of the used crack detection dataset, with different patterns—group-3. In each column, we present the results based on: (<b>a</b>) Image with a short wide crack on the edge, (<b>b</b>) Wide crack on the edge, (<b>c</b>) Image with a crack and corrosion, (<b>d</b>) Blurred image with a crack, (<b>e</b>) Blurred image with a crack inside ornaments.</p>
Full article ">Figure 15
<p>Results on several samples of the used crack detection dataset, with different patterns—group-4. In each column, we present the results based on: (<b>a</b>) Image with a branched crack (a multi-depth view), (<b>b</b>) Image with a crack inside carvings, (<b>c</b>) Image with a crack and marker, (<b>d</b>) Image with a crack inside ornaments, (<b>e</b>) Image with a branched crack.</p>
Full article ">
15 pages, 435 KiB  
Article
Research Trends, Enabling Technologies and Application Areas for Big Data
by Lars Lundberg and Håkan Grahn
Algorithms 2022, 15(8), 280; https://doi.org/10.3390/a15080280 - 9 Aug 2022
Cited by 5 | Viewed by 2622
Abstract
The availability of large amounts of data in combination with Big Data analytics has transformed many application domains. In this paper, we provide insights into how the area has developed in the last decade. First, we identify seven major application areas and six [...] Read more.
The availability of large amounts of data in combination with Big Data analytics has transformed many application domains. In this paper, we provide insights into how the area has developed in the last decade. First, we identify seven major application areas and six groups of important enabling technologies for Big Data applications and systems. Then, using bibliometrics and an extensive literature review of more than 80 papers, we identify the most important research trends in these areas. In addition, our bibliometric analysis also includes trends in different geographical regions. Our results indicate that manufacturing and agriculture or forestry are the two application areas with the fastest growth. Furthermore, our bibliometric study shows that deep learning and edge or fog computing are the enabling technologies increasing the most. We believe that the data presented in this paper provide a good overview of the current research trends in Big Data and that this kind of information is very useful when setting strategic agendas for Big Data research. Full article
Show Figures

Figure 1

Figure 1
<p>The number of research publications per year in the area of Big Data.</p>
Full article ">Figure 2
<p>The number of research publications per year for the Big Data application areas manufacturing, social media and finance.</p>
Full article ">Figure 3
<p>The number of research publications per year for the Big Data application areas of telecommunication, smart cities, image processing and agriculture or forestry.</p>
Full article ">Figure 4
<p>The number of research publications per year for the Big Data-enabling technologies deep learning and cloud computing.</p>
Full article ">Figure 5
<p>The number of research publications per year for the Big Data-enabling technologies of high-performance computing or supercomputing; parallel processing, distributed processing or GPU; storage systems, database systems or data lakes and edge computing or fog computing.</p>
Full article ">Figure 6
<p>The number of research publications in Big Data per year for different geographic regions.</p>
Full article ">Figure 7
<p>The number of research publications related to Big Data per year for AI and IoT.</p>
Full article ">
17 pages, 3352 KiB  
Article
High-Fidelity Surrogate Based Multi-Objective Optimization Algorithm
by Adel Younis and Zuomin Dong
Algorithms 2022, 15(8), 279; https://doi.org/10.3390/a15080279 - 7 Aug 2022
Cited by 1 | Viewed by 1794
Abstract
The employment of conventional optimization procedures that must be repeatedly invoked during the optimization process in real-world engineering applications is hindered despite significant gains in computing power by computationally expensive models. As a result, surrogate models that require far less time and resources [...] Read more.
The employment of conventional optimization procedures that must be repeatedly invoked during the optimization process in real-world engineering applications is hindered despite significant gains in computing power by computationally expensive models. As a result, surrogate models that require far less time and resources to analyze are used in place of these time-consuming analyses. In multi-objective optimization (MOO) problems involving pricey analysis and simulation techniques such as multi-physics modeling and simulation, finite element analysis (FEA), and computational fluid dynamics (CFD), surrogate models are found to be a promising endeavor, particularly for the optimization of complex engineering design problems involving black box functions. In order to reduce the expense of fitness function evaluations and locate the Pareto frontier for MOO problems, the automated multiobjective surrogate based Pareto finder MOO algorithm (AMSP) is proposed. Utilizing data samples taken from the feasible design region, the algorithm creates three surrogate models. The algorithm repeats the process of sampling and updating the Pareto set, by assigning weighting factors to those surrogates in accordance with the values of the root mean squared error, until a Pareto frontier is discovered. AMSP was successfully employed to identify the Pareto set and the Pareto border. Utilizing multi-objective benchmark test functions and engineering design examples such airfoil shape geometry of wind turbine, the unique approach was put to the test. The cost of computing the Pareto optima for test functions and real engineering design problem is reduced, and promising results were obtained. Full article
Show Figures

Figure 1

Figure 1
<p>Flowchart of the Proposed approach (AMSP).</p>
Full article ">Figure 2
<p>Schematic diagram of airfoil shape with twenty shape design variables.</p>
Full article ">Figure 3
<p>Airfoil shape design before and after optimization process.</p>
Full article ">Figure 4
<p>Computational simulations Pareto frontier determination of test function F1 (<b>a</b>) coordinates od sampling points; (<b>b</b>) sampling points in feasible design space; (<b>c</b>) coordinates of Pareto points; (<b>d</b>) the seeking Pareto frontier.</p>
Full article ">Figure 5
<p>Computational simulations Pareto frontier determination of test function F2 (<b>a</b>) coordinates od sampling points; (<b>b</b>) sampling points in feasible design space; (<b>c</b>) coordinates of Pareto points; (<b>d</b>) the seeking Pareto frontier.</p>
Full article ">Figure 6
<p>Computational simulations Pareto frontier determination of test function T1 (<b>a</b>) coordinates od sampling points; (<b>b</b>) sampling points in feasible design space; (<b>c</b>) coordinates of Pareto points; (<b>d</b>) the seeking Pareto frontier.</p>
Full article ">Figure 7
<p>Computational simulations Pareto frontier determination of test function T2 (<b>a</b>) coordinates od sampling points; (<b>b</b>) sampling points in feasible design space; (<b>c</b>) coordinates of Pareto points; (<b>d</b>) the seeking Pareto frontier.</p>
Full article ">Figure 8
<p>Computational simulations Pareto frontier determination of test function T3 (<b>a</b>) coordinates od sampling points; (<b>b</b>) sampling points in feasible design space; (<b>c</b>) coordinates of Pareto points; (<b>d</b>) the seeking Pareto frontier.</p>
Full article ">Figure 9
<p>Performance comparison of used optimization algorithms on test problems in terms of computational cost.</p>
Full article ">
24 pages, 11958 KiB  
Article
Simulation of Low-Speed Buoyant Flows with a Stabilized Compressible/Incompressible Formulation: The Full Navier–Stokes Approach versus the Boussinesq Model
by Guillermo Hauke and Jorge Lanzarote
Algorithms 2022, 15(8), 278; https://doi.org/10.3390/a15080278 - 5 Aug 2022
Cited by 2 | Viewed by 1674
Abstract
This paper compares two strategies to compute buoyancy-driven flows using stabilized methods. Both formulations are based on a unified approach for solving compressible and incompressible flows, which solves the continuity, momentum, and total energy equations in a coupled entropy-consistent way. The first approach [...] Read more.
This paper compares two strategies to compute buoyancy-driven flows using stabilized methods. Both formulations are based on a unified approach for solving compressible and incompressible flows, which solves the continuity, momentum, and total energy equations in a coupled entropy-consistent way. The first approach introduces the variable density thermodynamics of the liquid or gas without any artificial buoyancy terms, i.e., without applying any approximate models into the Navier–Stokes equations. Furthermore, this formulation holds for flows driven by high temperature differences. Further advantages of this formulation are seen in the fact that it conserves the total energy and it lacks the incompressibility inconsistencies due to volume changes induced by temperature variations. The second strategy uses the Boussinesq approximation to account for temperature-driven forces. This method models the thermal terms in the momentum equation through a temperature-dependent nonlinear source term. Computer examples show that the thermodynamic approach, which does not introduce any artificial terms into the Navier–Stokes equations, is conceptually simpler and, with the incompressible stabilization matrix, attains similar residual convergence with iteration count to methods based on the Boussinesq approximation. For the Boussinesq model, the SUPG and SGS methods are compared, displaying very similar computational behavior. Finally, the VMS a posteriori error estimator is applied to adapt the mesh, helping to achieve better accuracy for the same number of degrees of freedom. Full article
Show Figures

Figure 1

Figure 1
<p>Buoyancy-driven square cavity. Problem setup.</p>
Full article ">Figure 2
<p>Buoyancy-driven square cavity. Full Navier–Stokes equations. Residual convergence for various stabilization matrices.</p>
Full article ">Figure 3
<p>Buoyancy-driven square cavity. Boussinesq model with SUPG. Residual convergence for various stabilization matrices.</p>
Full article ">Figure 4
<p>Buoyancy-driven square cavity. Boussinesq model with SGS. Residual convergence for various stabilization matrices.</p>
Full article ">Figure 5
<p>Buoyancy-driven square cavity. Residual convergence for GMRES tolerances for the Boussinesq model.</p>
Full article ">Figure 6
<p>Buoyancy-driven square cavity. Comparative study of residual convergence for various methods.</p>
Full article ">Figure 7
<p>Buoyancy-driven square cavity. Full Navier–Stokes with the HH stabilization matrix. Comparison of Jacobian.</p>
Full article ">Figure 8
<p>Buoyancy-driven square cavity. Nusselt numbers along hot vertical wall for <math display="inline"><semantics> <mrow> <mi>ϵ</mi> <mo>=</mo> <mn>0.01</mn> </mrow> </semantics></math> and HH tau.</p>
Full article ">Figure 9
<p>Buoyancy-driven square cavity. Initial mesh and adapted meshes for <math display="inline"><semantics> <mrow> <mi>ϵ</mi> <mo>=</mo> <mn>0.01</mn> </mrow> </semantics></math>.</p>
Full article ">Figure 10
<p>Buoyancy-driven square cavity. Adapted solutions for <math display="inline"><semantics> <mrow> <mi>ϵ</mi> <mo>=</mo> <mn>0.01</mn> </mrow> </semantics></math> obtained with various methods and the HH tau.</p>
Full article ">Figure 11
<p>Buoyancy-driven square cavity. Nusselt numbers along hot vertical wall for <math display="inline"><semantics> <mrow> <mi>ϵ</mi> <mo>=</mo> <mn>0.6</mn> </mrow> </semantics></math> and Sutherland viscosity.</p>
Full article ">Figure 12
<p>Buoyancy-driven square cavity. Nusselt numbers along hot vertical wall for <math display="inline"><semantics> <mrow> <mi>ϵ</mi> <mo>=</mo> <mn>0.6</mn> </mrow> </semantics></math> and Sutherland viscosity for adapted meshes.</p>
Full article ">Figure 13
<p>Example of Iranian wind tower.</p>
Full article ">Figure 14
<p>2D model and working principle of a wind tower.</p>
Full article ">Figure 15
<p>Wind tower problem setup.</p>
Full article ">Figure 16
<p>Wind tower 1. Zoom of initial and adapted mesh around the tower.</p>
Full article ">Figure 17
<p>Wind tower 1. Velocity modulus obtained using the full NS and the Boussinesq model and <math display="inline"><semantics> <mrow> <msub> <mi>U</mi> <mo>∞</mo> </msub> <mo>=</mo> <mn>5</mn> </mrow> </semantics></math> m/s.</p>
Full article ">Figure 18
<p>Wind tower 1. Temperature field obtained using the full NS and the Boussinesq model and <math display="inline"><semantics> <mrow> <msub> <mi>U</mi> <mo>∞</mo> </msub> <mo>=</mo> <mn>5</mn> </mrow> </semantics></math> m/s.</p>
Full article ">Figure 19
<p>Wind tower 1. Apparent temperature field obtained by the full NS and the Boussinesq model with <math display="inline"><semantics> <mrow> <msub> <mi>U</mi> <mo>∞</mo> </msub> <mo>=</mo> <mn>5</mn> </mrow> </semantics></math> m/s.</p>
Full article ">Figure 20
<p>Wind tower 1. Comparative apparent temperature field obtained with the full NS with <math display="inline"><semantics> <mrow> <msub> <mi>U</mi> <mo>∞</mo> </msub> <mo>=</mo> <mn>1</mn> </mrow> </semantics></math> m/s and <math display="inline"><semantics> <mrow> <msub> <mi>U</mi> <mo>∞</mo> </msub> <mo>=</mo> <mn>5</mn> </mrow> </semantics></math> m/s.</p>
Full article ">Figure 21
<p>Wind tower 2. Zoom around dome geometry.</p>
Full article ">Figure 22
<p>Wind tower 2. VMS <span class="html-italic">T</span>-adapted mesh.</p>
Full article ">Figure 23
<p>Wind tower 2. Velocity modulus obtained with the full NS and the Boussinesq model and <math display="inline"><semantics> <mrow> <msub> <mi>U</mi> <mo>∞</mo> </msub> <mo>=</mo> <mn>5</mn> </mrow> </semantics></math> m/s.</p>
Full article ">Figure 24
<p>Wind tower 2. Apparent temperature field obtained by the full NS and the Boussinesq model with <math display="inline"><semantics> <mrow> <msub> <mi>U</mi> <mo>∞</mo> </msub> <mo>=</mo> <mn>5</mn> </mrow> </semantics></math> m/s.</p>
Full article ">
16 pages, 476 KiB  
Article
Solar Photovoltaic Integration in Monopolar DC Networks via the GNDO Algorithm
by Oscar Danilo Montoya, Walter Gil-González and Luis Fernando Grisales-Noreña
Algorithms 2022, 15(8), 277; https://doi.org/10.3390/a15080277 - 5 Aug 2022
Cited by 8 | Viewed by 2074
Abstract
This paper focuses on minimizing the annual operative costs in monopolar DC distribution networks with the inclusion of solar photovoltaic (PV) generators while considering a planning period of 20 years. This problem is formulated through a mixed-integer nonlinear programming (MINLP) model, in which [...] Read more.
This paper focuses on minimizing the annual operative costs in monopolar DC distribution networks with the inclusion of solar photovoltaic (PV) generators while considering a planning period of 20 years. This problem is formulated through a mixed-integer nonlinear programming (MINLP) model, in which binary variables define the nodes where the PV generators must be located, and continuous variables are related to the power flow solution and the optimal sizes of the PV sources. The implementation of a master–slave optimization approach is proposed in order to address the complexity of the MINLP formulation. In the master stage, the discrete-continuous generalized normal distribution optimizer (DCGNDO) is implemented to define the nodes for the PV sources along with their sizes. The slave stage corresponds to a specialized power flow approach for monopolar DC networks known as the successive approximation power flow method, which helps determine the total energy generation at the substation terminals and its expected operative costs in the planning period. Numerical results in the 33- and 69-bus grids demonstrate the effectiveness of the DCGNDO optimizer compared to the discrete-continuous versions of the Chu and Beasley genetic algorithm and the vortex search algorithm. Full article
Show Figures

Figure 1

Figure 1
<p>Variations in the Gaussian distribution as a function of the changes in the <math display="inline"><semantics> <mi>μ</mi> </semantics></math> and <math display="inline"><semantics> <mi>δ</mi> </semantics></math> parameters: (<b>a</b>) behavior of the Gaussian distribution when <math display="inline"><semantics> <mi>δ</mi> </semantics></math> is fixed, and <math display="inline"><semantics> <mi>μ</mi> </semantics></math> is varied; (<b>b</b>) behavior of the Gaussian distribution when <math display="inline"><semantics> <mi>μ</mi> </semantics></math> is fixed, and <math display="inline"><semantics> <mi>δ</mi> </semantics></math> is varied.</p>
Full article ">Figure 2
<p>General implementation of the GNDO approach in MATLAB software for the studied problem.</p>
Full article ">Figure 3
<p>Test feeder topologies: (<b>a</b>) 33-bus grid and (<b>b</b>) 69-bus grid.</p>
Full article ">Figure 4
<p>Daily demand and generation curves of Medellín, Colombia.</p>
Full article ">
5 pages, 180 KiB  
Editorial
Algorithms for Reliable Estimation, Identification and Control
by Andreas Rauh, Luc Jaulin and Julien Alexandre dit Sandretto
Algorithms 2022, 15(8), 276; https://doi.org/10.3390/a15080276 - 5 Aug 2022
Viewed by 1383
Abstract
The two-part Special Issue “Algorithms for Reliable Estimation, Identification and Control” deals with the optimization of feedforward and feedback controllers with respect to predefined performance criteria as well as the state and parameter estimation for systems with uncertainty [...] Full article
(This article belongs to the Special Issue Algorithms for Reliable Estimation, Identification and Control II)
16 pages, 4140 KiB  
Article
New Step Size Control Algorithm for Semi-Implicit Composition ODE Solvers
by Petr Fedoseev, Dmitriy Pesterev, Artur Karimov and Denis Butusov
Algorithms 2022, 15(8), 275; https://doi.org/10.3390/a15080275 - 4 Aug 2022
Cited by 7 | Viewed by 1804
Abstract
Composition is a powerful and simple approach for obtaining numerical integration methods of high accuracy order while preserving the geometric properties of a basic integrator. Adaptive step size control allows one to significantly increase the performance of numerical integration methods. However, there is [...] Read more.
Composition is a powerful and simple approach for obtaining numerical integration methods of high accuracy order while preserving the geometric properties of a basic integrator. Adaptive step size control allows one to significantly increase the performance of numerical integration methods. However, there is a lack of efficient step size control algorithms for composition solvers due to some known difficulties in constructing a low-cost embedded local error estimator. In this paper, we propose a novel local error estimator based on a difference between the semi-implicit CD method and semi-explicit midpoint methods within a common composition scheme. We evaluate the performance of adaptive composition schemes with the proposed local error estimator, comparing it with the other state-of-the-art approaches. We show that composition ODE solvers with the proposed step size control algorithm possess higher numerical efficiency than known methods, by using a comprehensive set of nonlinear test problems. Full article
(This article belongs to the Section Algorithms for Multidisciplinary Applications)
Show Figures

Figure 1

Figure 1
<p>Scheme of OCDM algorithm. <inline-formula><mml:math id="mm160"><mml:semantics><mml:mrow><mml:msub><mml:mstyle mathvariant="bold" mathsize="normal"><mml:mi>x</mml:mi></mml:mstyle><mml:mrow><mml:mi>n</mml:mi><mml:mo>+</mml:mo><mml:mn>1</mml:mn></mml:mrow></mml:msub></mml:mrow></mml:semantics></mml:math></inline-formula> is the main solution and <inline-formula><mml:math id="mm161"><mml:semantics><mml:mrow><mml:msub><mml:mstyle mathvariant="bold" mathsize="normal"><mml:mover accent="true"><mml:mi>x</mml:mi><mml:mo stretchy="false">˜</mml:mo></mml:mover></mml:mstyle><mml:mrow><mml:mi>n</mml:mi><mml:mo>+</mml:mo><mml:mn>1</mml:mn></mml:mrow></mml:msub></mml:mrow></mml:semantics></mml:math></inline-formula> is the additional solution introduced for error estimation.</p>
Full article ">Figure 2
<p>Scheme of DCOM algorithm. <inline-formula><mml:math id="mm162"><mml:semantics><mml:mrow><mml:msub><mml:mi>γ</mml:mi><mml:mi>k</mml:mi></mml:msub><mml:mo>,</mml:mo><mml:mi>k</mml:mi><mml:mo>=</mml:mo><mml:mn>1</mml:mn><mml:mo>,</mml:mo><mml:mn>2</mml:mn><mml:mo>,</mml:mo><mml:mo>…</mml:mo><mml:mo>,</mml:mo><mml:mi>s</mml:mi></mml:mrow></mml:semantics></mml:math></inline-formula> and <inline-formula><mml:math id="mm163"><mml:semantics><mml:mrow><mml:msub><mml:mover accent="true"><mml:mi>γ</mml:mi><mml:mo stretchy="false">˜</mml:mo></mml:mover><mml:mi>k</mml:mi></mml:msub><mml:mo>,</mml:mo><mml:mo> </mml:mo><mml:mi>k</mml:mi><mml:mo>=</mml:mo><mml:mn>1</mml:mn><mml:mo>,</mml:mo><mml:mn>2</mml:mn><mml:mo>,</mml:mo><mml:mo>…</mml:mo><mml:mo>,</mml:mo><mml:mi>u</mml:mi></mml:mrow></mml:semantics></mml:math></inline-formula> are coefficients for different composition schemes with <inline-formula><mml:math id="mm164"><mml:semantics><mml:mi>s</mml:mi></mml:semantics></mml:math></inline-formula> and <inline-formula><mml:math id="mm165"><mml:semantics><mml:mi>u</mml:mi></mml:semantics></mml:math></inline-formula> stages, respectively.</p>
Full article ">Figure 3
<p>General scheme of proposed error estimation algorithm in 2-stage composition scheme.</p>
Full article ">Figure 4
<p>Performance plots for Rössler system simulation using composition solvers of orders 4 (<bold>a</bold>), 6 (<bold>b</bold>), and 8 (<bold>c</bold>).</p>
Full article ">Figure 4 Cont.
<p>Performance plots for Rössler system simulation using composition solvers of orders 4 (<bold>a</bold>), 6 (<bold>b</bold>), and 8 (<bold>c</bold>).</p>
Full article ">Figure 5
<p>Step size behavior for different controllers under investigation while simulating Rössler system.</p>
Full article ">Figure 6
<p>Performance plots for Van der Pol oscillator simulation by solvers of orders 4 (<bold>a</bold>), 6 (<bold>b</bold>), and 8 (<bold>c</bold>).</p>
Full article ">Figure 7
<p>Graphs of step size behavior for different controllers under investigation for Van der Pol oscillator.</p>
Full article ">Figure 8
<p>Performance plots for two-body problem simulation by solvers of orders 4 (<bold>a</bold>), 6 (<bold>b</bold>), and 8 (<bold>c</bold>).</p>
Full article ">Figure 9
<p>Graphs of step size behavior for different controllers under investigation for two-body problem.</p>
Full article ">
16 pages, 1054 KiB  
Article
A Neural Network Approach for the Analysis of Reproducible Ribo–Seq Profiles
by Giorgia Giacomini, Caterina Graziani, Veronica Lachi, Pietro Bongini, Niccolò Pancino, Monica Bianchini, Davide Chiarugi, Angelo Valleriani and Paolo Andreini
Algorithms 2022, 15(8), 274; https://doi.org/10.3390/a15080274 - 4 Aug 2022
Cited by 3 | Viewed by 3248
Abstract
In recent years, the Ribosome profiling technique (Ribo–seq) has emerged as a powerful method for globally monitoring the translation process in vivo at single nucleotide resolution. Based on deep sequencing of mRNA fragments, Ribo–seq allows to obtain profiles that reflect the time spent [...] Read more.
In recent years, the Ribosome profiling technique (Ribo–seq) has emerged as a powerful method for globally monitoring the translation process in vivo at single nucleotide resolution. Based on deep sequencing of mRNA fragments, Ribo–seq allows to obtain profiles that reflect the time spent by ribosomes in translating each part of an open reading frame. Unfortunately, the profiles produced by this method can vary significantly in different experimental setups, being characterized by a poor reproducibility. To address this problem, we have employed a statistical method for the identification of highly reproducible Ribo–seq profiles, which was tested on a set of E. coli genes. State-of-the-art artificial neural network models have been used to validate the quality of the produced sequences. Moreover, new insights into the dynamics of ribosome translation have been provided through a statistical analysis on the obtained sequences. Full article
(This article belongs to the Special Issue Machine Learning Algorithms for Bioinformatics Problems)
Show Figures

Figure 1

Figure 1
<p>Ribosome footprint density along the mRNA. The schematic distribution of translating ribosomes along the mRNA (<bold>a</bold>) and their ribosome profiles (<bold>b</bold>). Ribo–seq data show differences in the density of ribosomes: regions of fast elongation accumulate fewer ribosomes (low density) with respect to regions of slow elongation (high density).</p>
Full article ">Figure 2
<p>Pairwise comparison of two Ribo–seq profiles of the ispB gene. Two independent Ribo–seq profiles (left) are obtained by computing the coverage at each nucleotide position within the ORF. x-axis: position within the ORF (nucleotides); y-axis (top): relative coverage (number of mapping reads/total number of reads) mapping on the ORF. The Ribo–seq profiles are compared to the median coverage to produce the digitalized <inline-formula><mml:math id="mm26"><mml:semantics><mml:mrow><mml:mo>±</mml:mo><mml:mn>1</mml:mn></mml:mrow></mml:semantics></mml:math></inline-formula> profiles (right). The digitalized profiles can be easily compared to detect matches (e.g., green rectangle) and mismatches (e.g., red rectangle). The ratio between the number of matches and the total number of nucleotides in the ORF gives the matching score. A score equal to one means a perfect match between the two profiles, whereas a score equal to one-half means a poor matching [<xref ref-type="bibr" rid="B6-algorithms-15-00274">6</xref>].</p>
Full article ">Figure 3
<p>Example of a significantly reproducible Ribo–seq profile across the eight datasets (gene ompC, EG10670).</p>
Full article ">Figure 4
<p>Part of a consensus sequence (computed for rsxC) indicating the nucleotides situated within fast (labelled with <inline-formula><mml:math id="mm27"><mml:semantics><mml:mrow><mml:mo>−</mml:mo><mml:mn>1</mml:mn></mml:mrow></mml:semantics></mml:math></inline-formula>) and slow (labelled with <inline-formula><mml:math id="mm28"><mml:semantics><mml:mrow><mml:mo>+</mml:mo><mml:mn>1</mml:mn></mml:mrow></mml:semantics></mml:math></inline-formula>) translation regions. On nucleotides labelled with 0, no reproducible results have been obtained [<xref ref-type="bibr" rid="B6-algorithms-15-00274">6</xref>].</p>
Full article ">Figure 5
<p>The MLP architecture having the nucleotide frequencies as input, and predicting the sequence class probability distribution (slow or fast).</p>
Full article ">Figure 6
<p>The 1-D CNN exploited for sequence classification.</p>
Full article ">Figure 7
<p>Representation of the sub-sequences on the plane based on the relative frequencies of two nucleotides. Each sub-sequence is represented by a dot on the plane. More specifically, the relative frequency of thymine and cytosine (<bold>a</bold>), adenine and thymine (<bold>b</bold>), cytosine and guanine (<bold>c</bold>), adenine and cytosine (<bold>d</bold>), thymine and guanine (<bold>e</bold>), and adenine and guanine (<bold>f</bold>), respectively, is shown. The colors represent the speed of translation: orange and blue dots indicate slow and fast sub-sequences, respectively.</p>
Full article ">
14 pages, 1141 KiB  
Article
Communication-Efficient Vertical Federated Learning
by Afsana Khan, Marijn ten Thij and Anna Wilbik
Algorithms 2022, 15(8), 273; https://doi.org/10.3390/a15080273 - 4 Aug 2022
Cited by 15 | Viewed by 4208
Abstract
Federated learning (FL) is a privacy-preserving distributed learning approach that allows multiple parties to jointly build machine learning models without disclosing sensitive data. Although FL has solved the problem of collaboration without compromising privacy, it has a significant communication overhead due to the [...] Read more.
Federated learning (FL) is a privacy-preserving distributed learning approach that allows multiple parties to jointly build machine learning models without disclosing sensitive data. Although FL has solved the problem of collaboration without compromising privacy, it has a significant communication overhead due to the repetitive updating of models during training. Several studies have proposed communication-efficient FL approaches to address this issue, but adequate solutions are still lacking in cases where parties must deal with different data features, also referred to as vertical federated learning (VFL). In this paper, we propose a communication-efficient approach for VFL that compresses the local data of clients, and then aggregates the compressed data from all clients to build an ML model. Since local data are shared in compressed form, the privacy of these data is preserved. Experiments on publicly available benchmark datasets using our proposed method show that the final model obtained by aggregation of compressed data from clients outperforms the performance of the local models of the clients. Full article
Show Figures

Figure 1

Figure 1
<p>Iterative Federated Learning Environment (Adapted from [<xref ref-type="bibr" rid="B4-algorithms-15-00273">4</xref>]).</p>
Full article ">Figure 2
<p>Architecture of Proposed Method.</p>
Full article ">Figure 3
<p>Undercomplete Autoencoder.</p>
Full article ">
17 pages, 1134 KiB  
Article
Building a Technology Recommender System Using Web Crawling and Natural Language Processing Technology
by Nathalie Campos Macias, Wilhelm Düggelin, Yesim Ruf and Thomas Hanne
Algorithms 2022, 15(8), 272; https://doi.org/10.3390/a15080272 - 3 Aug 2022
Cited by 7 | Viewed by 3616
Abstract
Finding, retrieving, and processing information on technology from the Internet can be a tedious task. This article investigates if technological concepts such as web crawling and natural language processing are suitable means for knowledge discovery from unstructured information and the development of a [...] Read more.
Finding, retrieving, and processing information on technology from the Internet can be a tedious task. This article investigates if technological concepts such as web crawling and natural language processing are suitable means for knowledge discovery from unstructured information and the development of a technology recommender system by developing a prototype of such a system. It also analyzes how well the resulting prototype performs in regard to effectivity and efficiency. The research strategy based on design science research consists of four stages: (1) Awareness generation; (2) suggestion of a solution considering the information retrieval process; (3) development of an artefact in the form of a Python computer program; and (4) evaluation of the prototype within the scope of a comparative experiment. The evaluation yields that the prototype is highly efficient in retrieving basic and rather random extractive text summaries from websites that include the desired search terms. However, the effectivity, measured by the quality of results is unsatisfactory due to the aforementioned random arrangement of extracted sentences within the resulting summaries. It is found that natural language processing and web crawling are indeed suitable technologies for such a program whilst the use of additional technology/concepts would add significant value for a potential user. Several areas for incremental improvement of the prototype are identified. Full article
Show Figures

Figure 1

Figure 1
<p>Research strategy based on design science research as suggested in [<a href="#B14-algorithms-15-00272" class="html-bibr">14</a>].</p>
Full article ">Figure 2
<p>Flow chart diagram of the basic tool chain suggested.</p>
Full article ">
26 pages, 7996 KiB  
Article
Optimal Motorcycle Engine Mount Design Parameter Identification Using Robust Optimization Algorithms
by Adel Younis, Fadi AlKhatib and Zuomin Dong
Algorithms 2022, 15(8), 271; https://doi.org/10.3390/a15080271 - 3 Aug 2022
Viewed by 3048
Abstract
Mechanical vibrations have a significant impact on ride comfort; the driver is constantly distracted as a result. Volumetric engine inertial unbalances and road profile irregularities create mechanical vibrations. The purpose of this study is to employ optimization algorithms to identify structural elements that [...] Read more.
Mechanical vibrations have a significant impact on ride comfort; the driver is constantly distracted as a result. Volumetric engine inertial unbalances and road profile irregularities create mechanical vibrations. The purpose of this study is to employ optimization algorithms to identify structural elements that contribute to vibration propagation and to provide optimal solutions for reducing structural vibrations induced by engine unbalance and/or road abnormalities in a motorcycle. The powertrain assembly, swing-arm assembly, and vibration-isolating mounts make up the vibration-isolating system. Engine mounts are used to restrict transferred forces to the motorbike frame owing to engine shaking or road irregularities. Two 12-degree-of-freedom (DOF) powertrain motorcycle engine systems (PMS) were modeled and examined for design optimization in this study. The first model was used to compute engine mount parameters by reducing the transmitted load through the mounts while only considering shaking loads, whereas the second model considered both shaking and road bump loads. In both configurations, the frame is infinitely stiff. The mount stiffness, location, and orientation are considered to be the design parameters. The purpose of this study is to employ computational methods to minimize the loads induced by shaking forces. To continue the optimization process, Grey Wolf Optimizer (GWO), a meta-heuristic swarm intelligence optimization algorithm inspired by grey wolves in nature, was utilized. To demonstrate GWO’s superior performance in PMS, other optimization methods such as a Genetic Algorithm (GA) and Sequential Quadratic Programming (SQP) were used for comparison. To minimize the engine’s transmitted force, GWO was employed to determine the optimal mounting design parameters. The cost and constraint functions were formulated and optimized, and promising results were obtained and documented. The vibration modes due to shaking and road loads were decoupled for a smooth ride. Full article
(This article belongs to the Special Issue Computational Methods and Optimization for Numerical Analysis)
Show Figures

Figure 1

Figure 1
<p>Powertrain and swing-arm layout [<a href="#B40-algorithms-15-00271" class="html-bibr">40</a>].</p>
Full article ">Figure 2
<p>Schematic diagram of the motorcycle engine mount model.</p>
Full article ">Figure 3
<p>GWO-optimized mode shapes 1–6 (12-DOF model—shaking loads only).</p>
Full article ">Figure 4
<p>GWO-optimized mode shapes 7–12 (12-DOF model—shaking loads only).</p>
Full article ">Figure 5
<p>GA-optimized mode shapes 1–6 (12-DOF model—shaking loads only).</p>
Full article ">Figure 6
<p>GA-optimized mode shapes 7–12 (12-DOF model—shaking loads only).</p>
Full article ">Figure 7
<p>SQP-optimized mode shapes 1–6 (12-DOF model—shaking loads only).</p>
Full article ">Figure 8
<p>SQP-optimized mode shapes 7–12 (12-DOF model—shaking loads only.</p>
Full article ">Figure 9
<p>GWO-optimized mode shapes 1–6 (12-DOF model—combined loading).</p>
Full article ">Figure 10
<p>GWO-optimized mode shapes 7–12 (12-DOF model—combined loading).</p>
Full article ">Figure 11
<p>GA-optimized mode shapes 1–6 (12-DOF model—combined loading).</p>
Full article ">Figure 12
<p>GA-optimized mode shapes 7–12 (12-DOF model—combined loading).</p>
Full article ">Figure 13
<p>SQP-optimized mode shapes 1–6 (12-DOF model—combined loading).</p>
Full article ">Figure 14
<p>SQP-optimized mode shapes 7–12 (12-DOF model–combined loading).</p>
Full article ">Figure 15
<p>Convergence characteristics of the optimization algorithms used for the 12-DOF model (shaking loads only).</p>
Full article ">Figure 16
<p>Convergence characteristics of the optimization algorithms used for the 12-DOF model (combined loading).</p>
Full article ">Figure 17
<p>Minimized transmitted force for the 12-DOF model (shaking loads only).</p>
Full article ">Figure 18
<p>Minimized transmitted force for the 12-DOF model (combined loading).</p>
Full article ">
22 pages, 2169 KiB  
Article
Validating and Testing an Agent-Based Model for the Spread of COVID-19 in Ireland
by Elizabeth Hunter and John D. Kelleher
Algorithms 2022, 15(8), 270; https://doi.org/10.3390/a15080270 - 3 Aug 2022
Cited by 8 | Viewed by 2766
Abstract
Agent-based models can be used to better understand the impacts of lifting restrictions or implementing interventions during a pandemic. However, agent-based models are computationally expensive, and running a model of a large population can result in a simulation taking too long to run [...] Read more.
Agent-based models can be used to better understand the impacts of lifting restrictions or implementing interventions during a pandemic. However, agent-based models are computationally expensive, and running a model of a large population can result in a simulation taking too long to run for the model to be a useful analysis tool during a public health crisis. To reduce computing time and power while running a detailed agent-based model for the spread of COVID-19 in the Republic of Ireland, we introduce a scaling factor that equates 1 agent to 100 people in the population. We present the results from model validation and show that the scaling factor increases the variability in the model output, but the average model results are similar in scaled and un-scaled models of the same population, and the scaled model is able to accurately simulate the number of cases per day in Ireland during the autumn of 2020. We then test the usability of the model by using the model to explore the likely impacts of increasing community mixing when schools reopen after summer holidays. Full article
(This article belongs to the Special Issue Artificial Intelligence in Modeling and Simulation)
Show Figures

Figure 1

Figure 1
<p>Plots showing cross validation results when 300 agents are infected at the start of the run in the original model and 3 agents are infected at the start of the run in the scaled model. (<b>a</b>) shows the total number of infected agents per day and (<b>b</b>) shows the newly infectious agents per day. For the scaled model the <span class="html-italic">y</span>-axis is the number of infected ×100. We also plot the average value across the 30 runs of the scaled model. Best viewed in color.</p>
Full article ">Figure 2
<p>Plots showing cross validation results when 1000 agents are infected at the start of the run in the original model and 10 agents are infected at the start of the run in the scaled model. (<b>a</b>) shows the total number of infected agents per day and (<b>b</b>) shows the newly infectious agents per day. For the scaled model the <span class="html-italic">y</span>-axis is the number of infected ×100. We also plot the average value across the 30 runs of the scaled model. Best viewed in color.</p>
Full article ">Figure 3
<p>Plots showing cross validation results when 10,000 agents are infected at the start of the run in the original model and 100 agents are infected at the start of the run in the scaled model. (<b>a</b>) shows the total number of infected agents per day and (<b>b</b>) shows the newly infectious agents per day. For the scaled model the <span class="html-italic">y</span>-axis is the number of infected ×100. We also plot the average value across the 30 runs of the scaled model. Best viewed in color.</p>
Full article ">Figure 4
<p>Plot showing the average simulated new cases per day across 30 runs for four different levels of movement. Dashed lines represent upper and lower bound of confidence intervals.</p>
Full article ">Figure 5
<p>Plot showing the average simulated new cases per day across 30 runs in blue and the real Irish case counts in yellow. Upper and lower bounds of confidence intervals for the average simulated new cases are represented in blue dashed lines.</p>
Full article ">Figure 6
<p>Plot showing the number of new infectious cases per day for the individual runs from the two scenarios.</p>
Full article ">Figure 7
<p>Plot showing average number of infectious agents at a given time based on their location of infection across 30 runs of the two mixing scenarios.</p>
Full article ">Figure 8
<p>Plots showing average number of infectious agents at a given time based on their age across 30 runs of the two scenarios.</p>
Full article ">
18 pages, 6796 KiB  
Article
Research of Flexible Assembly of Miniature Circuit Breakers Based on Robot Trajectory Optimization
by Yan Han, Liang Shu, Ziran Wu, Xuan Chen, Gaoyan Zhang and Zili Cai
Algorithms 2022, 15(8), 269; https://doi.org/10.3390/a15080269 - 31 Jul 2022
Cited by 5 | Viewed by 2230
Abstract
This paper is dedicated to achieving flexible automatic assembly of miniature circuit breakers (MCBs) to resolve the high rigidity issue of existing MCB assembly by proposing a flexible automatic assembly process and method with industrial robots. To optimize the working performance of the [...] Read more.
This paper is dedicated to achieving flexible automatic assembly of miniature circuit breakers (MCBs) to resolve the high rigidity issue of existing MCB assembly by proposing a flexible automatic assembly process and method with industrial robots. To optimize the working performance of the robot, a time-optimal trajectory planning method of the improved Particle Swarm Optimization (PSO) with a multi-optimization mechanism is proposed. The solution uses a fitness switch function for particle sifting to improve the stability of the acceleration and jerk of the robot motion as well as to increase the computational efficiency. The experimental results show that the proposed method achieves flexible assembly for multi-type MCB parts of varying postures. Compared with other optimization algorithms, the proposed improved PSO is significantly superior in both computational efficiency and optimization accuracy. Compared with the standard PSO, the proposed trajectory planning method shortens the assembly time by 6.9 s and raises the assembly efficiency by 16.7%. The improved PSO is implemented on the experimental assembly platform and achieves smooth and stable operations, which proves the high significance and practicality for MCB fabrication. Full article
Show Figures

Figure 1

Figure 1
<p>Internal structure of an MCB.</p>
Full article ">Figure 2
<p>Models of the parts to be assembled.</p>
Full article ">Figure 3
<p>Posture adjustment platform.</p>
Full article ">Figure 4
<p>Robot flexible multi-gripper claw.</p>
Full article ">Figure 5
<p>Auxiliary adjustment rack for the parts.</p>
Full article ">Figure 6
<p>Flexible assembly processes for the parts: (<b>a</b>) arc extinguishing cover posture adjustment; (<b>b</b>) position adjustment of other parts.</p>
Full article ">Figure 7
<p>Positioning carrier with adjusted parts.</p>
Full article ">Figure 8
<p>Schematic diagram of the robot connecting rod structure.</p>
Full article ">Figure 9
<p>Improve PSO process.</p>
Full article ">Figure 10
<p>Schematic diagram of robot segmentation.</p>
Full article ">Figure 11
<p>Joint motions before optimization: (<b>a</b>) Position curve; (<b>b</b>) Velocity curve; (<b>c</b>) Acceleration curve; (<b>d</b>) Jerk curve.</p>
Full article ">Figure 12
<p>Comparison of iterative process before and after PSO algorithm improvement.</p>
Full article ">Figure 13
<p>Joint motions after optimization: (<b>a</b>) Position curve; (<b>b</b>) Velocity curve; (<b>c</b>) Acceleration curve; (<b>d</b>) Jerk curve.</p>
Full article ">Figure 14
<p>Time-optimal trajectory planning by the improved PSO: (<b>a</b>) section AB <span class="html-italic">t</span><sub>1</sub> trajectory; (<b>b</b>) section AB <span class="html-italic">t</span><sub>2</sub> trajectory; (<b>c</b>) section AB <span class="html-italic">t</span><sub>3</sub> trajectory.</p>
Full article ">Figure 15
<p>Experimental platform of posture adjustment.</p>
Full article ">Figure 16
<p>Flexible assembly experiment.</p>
Full article ">
16 pages, 1677 KiB  
Article
Cancer Identification in Walker 256 Tumor Model Exploring Texture Properties Taken from Microphotograph of Rats Liver
by Mateus F. T. Carvalho, Sergio A. Silva, Jr., Carla Cristina O. Bernardo, Franklin César Flores, Juliana Vanessa C. M. Perles, Jacqueline Nelisis Zanoni and Yandre M. G. Costa
Algorithms 2022, 15(8), 268; https://doi.org/10.3390/a15080268 - 31 Jul 2022
Viewed by 2194
Abstract
Recent studies have been evaluating the presence of patterns associated with the occurrence of cancer in different types of tissue present in the individual affected by the disease. In this article, we describe preliminary results for the automatic detection of cancer (Walker 256 [...] Read more.
Recent studies have been evaluating the presence of patterns associated with the occurrence of cancer in different types of tissue present in the individual affected by the disease. In this article, we describe preliminary results for the automatic detection of cancer (Walker 256 tumor) in laboratory animals using preclinical microphotograph images of the subject’s liver tissue. In the proposed approach, two different types of descriptors were explored to capture texture properties from the images, and we also evaluated the complementarity between them. The first texture descriptor experimented is the widely known Local Phase Quantization (LPQ), which is a descriptor based on spectral information. The second one is built by the application of a granulometry given by a family of morphological filters. For classification, we have evaluated the algorithms Support Vector Machine (SVM), k-Nearest Neighbor (k-NN) and Logistic Regression. Experiments carried out on a carefully curated dataset developed by the Enteric Neural Plasticity Laboratory of the State University of Maringá showed that both texture descriptors provide good results in this scenario. The accuracy rates obtained using the SVM classifier were 96.67% for the texture operator based on granulometry and 91.16% for the LPQ operator. The dataset was made available also as a contribution of this work. In addition, it is important to remark that the best overall result was obtained by combining classifiers created using both descriptors in a late fusion strategy, achieving an accuracy of 99.16%. The results obtained show that it is possible to automatically perform the identification of cancer in laboratory animals by exploring texture properties found on the tissue taken from the liver. Moreover, we observed a high level of complementarity between the classifiers created using LPQ and granulometry properties in the application addressed here. Full article
(This article belongs to the Special Issue Algorithms for Biomedical Image Analysis and Processing)
Show Figures

Figure 1

Figure 1
<p>Liver microphotograph from the control group (C).</p>
Full article ">Figure 2
<p>Liver microphotograph from the Walker 256 tumor group (TW).</p>
Full article ">Figure 3
<p>Pixels affected by application of a opening by reconstruction and of a closing by reconstruction, using a disk structuring element with radius one.</p>
Full article ">Figure 4
<p>GBD generated by an opening by reconstruction. A disk-structuring element with radius <math display="inline"><semantics> <mi>λ</mi> </semantics></math> was used for each <math display="inline"><semantics> <mi>λ</mi> </semantics></math>.</p>
Full article ">Figure 5
<p>Binary size distributions from an area opening granulometry, <math display="inline"><semantics> <mrow> <mi>λ</mi> <mo>∈</mo> <mo>[</mo> <mn>1</mn> <mo>,</mo> <mo>⋯</mo> <mo>,</mo> <mn>50</mn> <mo>]</mo> </mrow> </semantics></math>. One size distribution was computed for each image from the dataset introduced in <a href="#sec3-algorithms-15-00268" class="html-sec">Section 3</a>.</p>
Full article ">Figure 6
<p>Binary size distributions from an area closing granulometry, <math display="inline"><semantics> <mrow> <mi>λ</mi> <mo>∈</mo> <mo>[</mo> <mn>1</mn> <mo>,</mo> <mo>⋯</mo> <mo>,</mo> <mn>50</mn> <mo>]</mo> </mrow> </semantics></math>. One size distribution was computed for each image from the dataset introduced in <a href="#sec3-algorithms-15-00268" class="html-sec">Section 3</a>.</p>
Full article ">Figure 7
<p>General overview of the methodology used for classification.</p>
Full article ">
14 pages, 678 KiB  
Article
Short Text Classification with Tolerance-Based Soft Computing Method
by Vrushang Patel, Sheela Ramanna, Ketan Kotecha and Rahee Walambe
Algorithms 2022, 15(8), 267; https://doi.org/10.3390/a15080267 - 30 Jul 2022
Cited by 3 | Viewed by 2452
Abstract
Text classification aims to assign labels to textual units such as documents, sentences and paragraphs. Some applications of text classification include sentiment classification and news categorization. In this paper, we present a soft computing technique-based algorithm (TSC) to classify sentiment polarities of tweets [...] Read more.
Text classification aims to assign labels to textual units such as documents, sentences and paragraphs. Some applications of text classification include sentiment classification and news categorization. In this paper, we present a soft computing technique-based algorithm (TSC) to classify sentiment polarities of tweets as well as news categories from text. The TSC algorithm is a supervised learning method based on tolerance near sets. Near sets theory is a more recent soft computing methodology inspired by rough sets where instead of set approximation operators used by rough sets to induce tolerance classes, the tolerance classes are directly induced from the feature vectors using a tolerance level parameter and a distance function. The proposed TSC algorithm takes advantage of the recent advances in efficient feature extraction and vector generation from pre-trained bidirectional transformer encoders for creating tolerance classes. Experiments were performed on ten well-researched datasets which include both short and long text. Both pre-trained SBERT and TF-IDF vectors were used in the experimental analysis. Results from transformer-based vectors demonstrate that TSC outperforms five well-known machine learning algorithms on four datasets, and it is comparable with all other datasets based on the weighted F1, Precision and Recall scores. The highest AUC-ROC (Area under the Receiver Operating Characteristics) score was obtained in two datasets and comparable in six other datasets. The highest ROC-PRC (Area under the Precision–Recall Curve) score was obtained in one dataset and comparable in four other datasets. Additionally, significant differences were observed in most comparisons when examining the statistical difference between the weighted F1-score of TSC and other classifiers using a Wilcoxon signed-ranks test. Full article
(This article belongs to the Special Issue Algorithms for Machine Learning and Pattern Recognition Tasks)
Show Figures

Figure 1

Figure 1
<p>High-level process flow of the proposed TSC algorithm.</p>
Full article ">Figure 2
<p>Distance Matrix for TF-IDF Vectors.</p>
Full article ">Figure 3
<p>TSC Algorithm: Weighted F1-score for all datasets using mean-value (TSC-mean) prototype vectors for different <math display="inline"><semantics> <mi>ε</mi> </semantics></math> values.</p>
Full article ">Figure 4
<p>TSC Algorithm: Weighted F1-score for all datasets using median-value (TSC-median) prototype vectors for different <math display="inline"><semantics> <mi>ε</mi> </semantics></math> values.</p>
Full article ">
21 pages, 370 KiB  
Article
Dark Type Dynamical Systems: The Integrability Algorithm and Applications
by Yarema A. Prykarpatsky, Ilona Urbaniak, Radosław A. Kycia and Anatolij K. Prykarpatski
Algorithms 2022, 15(8), 266; https://doi.org/10.3390/a15080266 - 28 Jul 2022
Cited by 4 | Viewed by 1419
Abstract
Based on a devised gradient-holonomic integrability testing algorithm, we analyze a class of dark type nonlinear dynamical systems on spatially one-dimensional functional manifolds possessing hidden symmetry properties and allowing their linearization on the associated cotangent spaces. We described main spectral properties of nonlinear [...] Read more.
Based on a devised gradient-holonomic integrability testing algorithm, we analyze a class of dark type nonlinear dynamical systems on spatially one-dimensional functional manifolds possessing hidden symmetry properties and allowing their linearization on the associated cotangent spaces. We described main spectral properties of nonlinear Lax type integrable dynamical systems on periodic functional manifolds particular within the classical Floquet theory, as well as we presented the determining functional relationships between the conserved quantities and related geometric Poisson and recursion structures on functional manifolds. For evolution flows on functional manifolds, parametrically depending on additional functional variables, naturally related with the classical Bellman-Pontriagin optimal control problem theory, we studied a wide class of nonlinear dynamical systems of dark type on spatially one-dimensional functional manifolds, which are both of diffusion and dispersion classes and can have interesting applications in modern physics, optics, mechanics, hydrodynamics and biology sciences. We prove that all of these dynamical systems possess rich hidden symmetry properties, are Lax type linearizable and possess finite or infinite hierarchies of suitably ordered conserved quantities. Full article
(This article belongs to the Special Issue Mathematical Models and Their Applications III)
Previous Issue
Back to TopTop