[go: up one dir, main page]

 
 
applsci-logo

Journal Browser

Journal Browser

The Development and Application of Fuzzy Logic

A topical collection in Applied Sciences (ISSN 2076-3417). This collection belongs to the section "Computing and Artificial Intelligence".

Viewed by 87424

Editors


E-Mail Website
Guest Editor
Department of Electronic Engineering, Kwangwoon University, Bima Build. #525, 20 Kwangwoon-ro, Nowon-gu, Seoul 01897, Republic of Korea
Interests: RFIC/MMIC/IPD device and system design; wireless communication; design and fab-rication of device and systems; RF biosensors; ICT convergence
Special Issues, Collections and Topics in MDPI journals

Topical Collection Information

Dear Colleagues

Fuzzy systems are one of the most exciting fields of computing today. Over the past decades, fuzzy logic has become a solid part of everyday life and has been successfully used to solve real world problems.

The applications of fuzzy systems are very broad, including engineering, industrial, business, finance, medicine and many other areas.

Fuzzy systems cover a wide range of learning algorithms, including classical algorithms such as linear regression.

Development and application of fuzzy logic through support vector machines and neural networks or newly developed algorithms such as deep learning and boost tree models. Indeed, it is very difficult to properly determine the appropriate architecture and parameters of the fuzzy method so that the resulting learner model can achieve sound performance for both training and generalization.

The practical application of fuzzy systems poses additional challenges such as dealing with large, missing, distorted, and uncertain data. Also, interpretability is the most important characteristic that must be achieved if the fuzzy method is actually applied.

Interpretability allows you to understand fuzzy model behavior and increase confidence in the results.

This collection focuses on the application of fuzzy models in various fields and problems. Applied papers report practical results for various learning methods, discuss the conceptualization of problems, data representation, functional engineering, fuzzy models, critical comparisons with existing technologies, and interpretation of results.

Special attention will be paid to recently developed fuzzy methods such as deep learning and artificial intelligence.

This collection,”The Development and Application of Fuzzy Logic”, covers basic, applied, artificial intelligence, control, robotics, data analysis, data mining, decision making, finance and management, information systems, operational research, pattern recognition and image processing, In the field of soft computing and uncertainty modeling, we present a new development in the field of theory and application of fuzzy systems.

The anticipated submitted papers are expected to meet the theoretical release and increase in application and development using fuzzy system technology. New ideas that suggest a disruptive approach are also welcome.

Topics of interest include the following areas:

  • Fuzzy genetic algorithm.
  • Hybrid and fuzzy knowledge-based networks.
  • Purge system and deep learning.
  • Software engineering for fuzzy systems.
  • Fuzzy systems in robotics and mechatronics.
  • Fuzzy system application in signal processing.
  • Patern Recognition's fuzzy system application.
  • Fuzzy system application in communication.
  • Artificial Intelligence.

Prof. Dr. Seongsoo Cho
Prof. Dr. Bhanu Shrestha
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the collection website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Applied Sciences is an international peer-reviewed open access semimonthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2400 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Published Papers (24 papers)

2023

Jump to: 2022, 2021, 2020

25 pages, 6804 KiB  
Article
Determination of Crop Soil Quality for Stevia rebaudiana Bertoni Morita II Using a Fuzzy Logic Model and a Wireless Sensor Network
by Angel-Primitivo Vejar-Cortés, Noel García-Díaz, Leonel Soriano-Equigua, Ana-Claudia Ruiz-Tadeo and José-Luis Álvarez-Flores
Appl. Sci. 2023, 13(17), 9507; https://doi.org/10.3390/app13179507 - 22 Aug 2023
Cited by 1 | Viewed by 2070
Abstract
Stevia rebaudiana Bertoni Morita II, a perennial plant native to Paraguay and Brazil, is also widely cultivated in the state of Colima, Mexico, for its use as a sweetener in food and beverages. The optimization of soil parameters is crucial for maximizing biomass [...] Read more.
Stevia rebaudiana Bertoni Morita II, a perennial plant native to Paraguay and Brazil, is also widely cultivated in the state of Colima, Mexico, for its use as a sweetener in food and beverages. The optimization of soil parameters is crucial for maximizing biomass production and stevioside levels in stevia crops. This research presents the development and implementation of a monitoring system to track essential soil parameters, including pH, temperature, humidity, electrical conductivity, nitrogen, phosphorus, and potassium. The system employs a wireless sensor network to collect quasi-real-time data, which are transmitted and stored in a web-based platform. A Mamdani-type fuzzy logic model is utilized to process the collected data and provide farmers an integrated assessment of soil quality. By comparing the quality data output of the fuzzy logic model with a linear regression model, the system demonstrated acceptable performance, with a determination coefficient of 0.532 for random data and 0.906 for gathered measurements. The system enables farmers to gain insights into the soil quality of their stevia crops and empowers them to take preventive and corrective actions to improve the soil quality specifically for stevia crops. Full article
Show Figures

Figure 1

Figure 1
<p>Block diagram of the implemented monitoring system.</p>
Full article ">Figure 2
<p>Block diagram of the sensor node’s components.</p>
Full article ">Figure 3
<p>Node distribution on Rancho Tajeli.</p>
Full article ">Figure 4
<p>Implementation of a sensor node on a Stevia Morita II crop.</p>
Full article ">Figure 5
<p>Web platform structure.</p>
Full article ">Figure 6
<p>Expected JSON for the API’s endpoint for adding measurements, it supports different node types and showcases different node addresses.</p>
Full article ">Figure 7
<p>FLM composed of three interconnected fuzzy models that determine physicochemical quality macronutrient concentration, and soil quality.</p>
Full article ">Figure 8
<p>Visual representation of each linguistic term of (<b>a</b>) input pH MFs; (<b>b</b>) input temperature’s MFs.</p>
Full article ">Figure 9
<p>Visual representation of each linguistic term of (<b>a</b>) soil quality MFs; (<b>b</b>) macronutrient concentration MFs.</p>
Full article ">Figure 10
<p>(<b>a</b>) Main menu of the web platform. (<b>b</b>) Historical data section, including a plot showing all soil parameters with different colors.</p>
Full article ">Figure 11
<p>(<b>a</b>) Export data section of the web platform, showing the query menu that allows for date range selection and node selection. (<b>b</b>) CSV file downloaded using the data export section of the web platform.</p>
Full article ">Figure 12
<p>Monitored variables’ evolution over one day. Plot generated using the web platform.</p>
Full article ">Figure 13
<p>Histograms of data collected using the monitoring system.</p>
Full article ">Figure 14
<p>(<b>a</b>) Scatter plot of the fuzzy model compared to the linear regression model using collected data from the stevia crop. (<b>b</b>) Scatter plot of the fuzzy model compared to the linear regression model using randomly generated data.</p>
Full article ">Figure 15
<p>Histograms of the randomly generated data for fuzzy model validation.</p>
Full article ">

2022

Jump to: 2023, 2021, 2020

20 pages, 1174 KiB  
Review
A Review on Applications of Fuzzy Logic Control for Refrigeration Systems
by Juan Manuel Belman-Flores, David Alejandro Rodríguez-Valderrama, Sergio Ledesma, Juan José García-Pabón, Donato Hernández and Diana Marcela Pardo-Cely
Appl. Sci. 2022, 12(3), 1302; https://doi.org/10.3390/app12031302 - 26 Jan 2022
Cited by 44 | Viewed by 9635
Abstract
The use of fuzzy logic controllers in refrigeration and air conditioning systems, RACs, has as main objective to maintain certain thermal and comfort conditions. In this sense, fuzzy controllers have proven to be a viable option for use in RACs due to their [...] Read more.
The use of fuzzy logic controllers in refrigeration and air conditioning systems, RACs, has as main objective to maintain certain thermal and comfort conditions. In this sense, fuzzy controllers have proven to be a viable option for use in RACs due to their ease of implementation and their ability to integrate with other control systems and control improvements, as well as their ability to achieve potential energy savings. In this document, we present a review of the application of fuzzy controls in RACs based on vapor compression technology. Application information is discussed for each type of controller, according to its application in chillers, air conditioning systems, refrigerators, and heat pumps. In addition, this review provides detailed information on controller design, focusing on the potential to achieve energy savings; this design discusses input and output variables, number and type of membership functions, and inference rules. The future perspectives on the use of fuzzy control systems applied to RACs are shown as well. In other words, the information in this document is intended to serve as a guide for the creation of controller designs to be applied to RACs. Full article
Show Figures

Figure 1

Figure 1
<p>General scheme of a fuzzy controller.</p>
Full article ">Figure 2
<p>Membership function sets for the input and output variables. (<b>a</b>) trapezoidal functions; (<b>b</b>) Gaussian functions.</p>
Full article ">Figure 3
<p>General scheme of a PID-fuzzy controller.</p>
Full article ">

2021

Jump to: 2023, 2022, 2020

18 pages, 2067 KiB  
Article
Fuzzy Logic in Selection of Maritime Search and Rescue Units
by Marzena Malyszko
Appl. Sci. 2022, 12(1), 21; https://doi.org/10.3390/app12010021 - 21 Dec 2021
Cited by 9 | Viewed by 2876
Abstract
The article discusses methods of ships assessment when determining their suitability for search and rescue action (SAR) at sea. Selection of the most preferable ships is one of the action planning elements. Due to various construction and equipment the civilian ships can only [...] Read more.
The article discusses methods of ships assessment when determining their suitability for search and rescue action (SAR) at sea. Selection of the most preferable ships is one of the action planning elements. Due to various construction and equipment the civilian ships can only perform rescue task to a certain degree. According to the Multi-Criteria Decision Analysis (MCDA), many parameters and data have to be compared in order to create a ranking of vessels ordered according to the coordinator’s preferences. When data are missing, incomplete or uncertain, a similar effect can be obtained using fuzzy logic. The author discussed the nature of the criteria, evaluation methods and presented a simulation of a ship study using fuzzy logic. The author developed fuzzy rules and presented the principle of operation of the controller. The article deals with the main principles of a decision support system (DSS) for the selection of ships in SAR operations. Full article
Show Figures

Figure 1

Figure 1
<p>Level preference function—MCDA Promethee II.</p>
Full article ">Figure 2
<p>Typical membership functions.</p>
Full article ">Figure 3
<p>Input linguistic variables and output value.</p>
Full article ">Figure 4
<p>Operation of the controller.</p>
Full article ">Figure 5
<p>Dialog window of the Visual Promethee software.</p>
Full article ">Figure 6
<p>Results of the analysis (table and network). Left: Case 1, Right: Case 2.</p>
Full article ">Figure 7
<p>Decision support system blocks for selection of maritime search and rescue units.</p>
Full article ">
15 pages, 1042 KiB  
Article
The Evaluation of Software Security through Quantum Computing Techniques: A Durability Perspective
by Hashem Alyami, Mohd Nadeem, Abdullah Alharbi, Wael Alosaimi, Md Tarique Jamal Ansari, Dhirendra Pandey, Rajeev Kumar and Raees Ahmad Khan
Appl. Sci. 2021, 11(24), 11784; https://doi.org/10.3390/app112411784 - 11 Dec 2021
Cited by 30 | Viewed by 3590
Abstract
The primary goal of this research study, in the field of information technology (IT), is to improve the security and durability of software. A quantum computing-based security algorithm springs quite a lot of symmetrical approaches and procedures to ensure optimum software retreat. The [...] Read more.
The primary goal of this research study, in the field of information technology (IT), is to improve the security and durability of software. A quantum computing-based security algorithm springs quite a lot of symmetrical approaches and procedures to ensure optimum software retreat. The accurate assessment of software’s durability and security is a dynamic aspect in assessing, administrating, and controlling security for strengthening the features of security. This paper essentially emphasises the demarcation and depiction of quantum computing from a software security perspective. At present, different symmetrical-based cryptography approaches or algorithms are being used to protect different government and non-government sectors, such as banks, healthcare sectors, defense, transport, automobiles, navigators, weather forecasting, etc., to ensure software durability and security. However, many crypto schemes are likely to collapse when a large qubit-based quantum computer is developed. In such a scenario, it is necessary to pay attention to the security alternatives based on quantum computing. Presently, the different factors of software durability are usability, dependability, trustworthiness, and human trust. In this study, we have also classified the durability level in the second stage. The intention of the evaluation of the impact on security over quantum duration is to estimate and assess the security durability of software. In this research investigation, we have followed the symmetrical hybrid technique of fuzzy analytic hierarchy process (FAHP) and fuzzy technique for order of preference by similarity to ideal solution (FTOPSIS). The obtained results, and the method used in this estimation, would make a significant contribution to future research for organising software security and durability (SSD) in the presence of a quantum computer. Full article
Show Figures

Figure 1

Figure 1
<p>Schematic diagram of software durability factors and quantum security alternatives.</p>
Full article ">Figure 2
<p>Triangular fuzzy number.</p>
Full article ">Figure 3
<p>Graphical representation of sensitivity analysis.</p>
Full article ">
17 pages, 2055 KiB  
Article
A Machine Learning Approach to Predict Customer Usage of a Home Workout Platform
by Qiuying Chen and SangJoon Lee
Appl. Sci. 2021, 11(21), 9927; https://doi.org/10.3390/app11219927 - 24 Oct 2021
Cited by 6 | Viewed by 3891
Abstract
Health authorities have recommended the use of digital tools for home workouts to stay active and healthy during the COVID-19 pandemic. In this paper, a machine learning approach is proposed to assess the activity of users on a home workout platform. Keep is [...] Read more.
Health authorities have recommended the use of digital tools for home workouts to stay active and healthy during the COVID-19 pandemic. In this paper, a machine learning approach is proposed to assess the activity of users on a home workout platform. Keep is a home workout application dedicated to providing one-stop exercise solutions such as fitness teaching, cycling, running, yoga, and fitness diet guidance. We used a data crawler to collect the total training set data of 7734 Keep users and compared four supervised learning algorithms: support vector machine, k-nearest neighbor, random forest, and logistic regression. The receiver operating curve analysis indicated that the overall discrimination verification power of random forest was better than that of the other three models. The random forest model was used to classify 850 test samples, and a correct rate of 88% was obtained. This approach can predict the continuous usage of users after installing the home workout application. We considered 18 variables on Keep that were expected to affect the determination of continuous participation. Keep certification is the most important variable that affected the results of this study. Keep certification refers to someone who has verified their identity information and can, therefore, obtain the Keep certification logo. The results show that the platform still needs to be improved in terms of real identity privacy information and other aspects. Full article
Show Figures

Figure 1

Figure 1
<p>Structure example.</p>
Full article ">Figure 2
<p>Modeling process of Random Forest.</p>
Full article ">Figure 3
<p>Data crawler.</p>
Full article ">Figure 4
<p>Ranking of predicted contributions of variables.</p>
Full article ">
20 pages, 6553 KiB  
Article
An Empirical Study of a Trustworthy Cloud Common Data Model Using Decentralized Identifiers
by Yunhee Kang, Jaehyuk Cho and Young B. Park
Appl. Sci. 2021, 11(19), 8984; https://doi.org/10.3390/app11198984 - 27 Sep 2021
Cited by 7 | Viewed by 2969
Abstract
The Conventional Cloud Common Data Model (CDM) uses a centralized method of user identification and credentials. This needs to be solved in a decentralized way because there are limitations in interoperability such as closed identity management and identity leakage. In this paper, we [...] Read more.
The Conventional Cloud Common Data Model (CDM) uses a centralized method of user identification and credentials. This needs to be solved in a decentralized way because there are limitations in interoperability such as closed identity management and identity leakage. In this paper, we propose a DID (Decentralized Identifier)-based cloud CDM that allows researchers to securely store medical research information by authenticating their identity and to access the CDM reliably. The proposed service model is used to provide the credential of the researcher in the process of creating and accessing CDM data in the designed secure cloud. This model is designed on a DID-based user-centric identification system to support the research of enrolled researchers in a cloud CDM environment involving multiple hospitals and laboratories. The prototype of the designed model is an extension of the encrypted CDM delivery method using DID and provides an identification system by limiting the use cases of CDM data by researchers registered in cloud CDM. Prototypes built for agent-based proof of concept (PoC) are leveraged to enhance security for researcher use of ophthalmic CDM data. For this, the CDM ID schema and ID definition are described by issuing IDs of CDM providers and CDM agents, limiting the IDs of researchers who are CDM users. The proposed method is to provide a framework for integrated and efficient data access control policy management. It provides strong security and ensures both the integrity and availability of CDM data. Full article
Show Figures

Figure 1

Figure 1
<p>The DID model proposed by W3C.</p>
Full article ">Figure 2
<p>Conventional concept of the Common Data Model (CDM) and operation scheme.</p>
Full article ">Figure 3
<p>Concept of the Secure-Cloud Common Data Model (SC-CDM).</p>
Full article ">Figure 4
<p>The overall concept of authentication and authorization in cloud CDM.</p>
Full article ">Figure 5
<p>The DID-based trust model for cloud CDM.</p>
Full article ">Figure 6
<p>The process of issuing and verifying credential when handling CDM.</p>
Full article ">Figure 7
<p>Schema definition for CDM identity issued by IRB.</p>
Full article ">Figure 8
<p>The von-network running in cloud CDM.</p>
Full article ">Figure 9
<p>Trust over IP framework [<a href="#B36-applsci-11-08984" class="html-bibr">36</a>].</p>
Full article ">Figure 10
<p>JSON format of IRB invitation attribute.</p>
Full article ">Figure 11
<p>JSON format of the accepted message associated with the invitation.</p>
Full article ">Figure 12
<p>Researcher VC offered by the IRB upon registration.</p>
Full article ">Figure 13
<p>The result of the process the proof by using ZKP.</p>
Full article ">Figure 14
<p>The proof.</p>
Full article ">Figure 15
<p>Flow of access control in cloud CDM. ① Search in trust manager ② Request data from the hospital where the data are available ③ Request for CDM data, attachment of access control list ④ Request result, ACL ⑤ IRB approval (user, data approval range, period of use) ⑥ Approval notice ⑦ User analysis.</p>
Full article ">
20 pages, 3620 KiB  
Article
Deep Reinforcement Learning-Based Network Routing Technology for Data Recovery in Exa-Scale Cloud Distributed Clustering Systems
by Dong-Jin Shin and Jeong-Joon Kim
Appl. Sci. 2021, 11(18), 8727; https://doi.org/10.3390/app11188727 - 18 Sep 2021
Cited by 6 | Viewed by 3800
Abstract
Research has been conducted to efficiently transfer blocks and reduce network costs when decoding and recovering data from an erasure coding-based distributed file system. Technologies using software-defined network (SDN) controllers can collect and more efficiently manage network data. However, the bandwidth depends dynamically [...] Read more.
Research has been conducted to efficiently transfer blocks and reduce network costs when decoding and recovering data from an erasure coding-based distributed file system. Technologies using software-defined network (SDN) controllers can collect and more efficiently manage network data. However, the bandwidth depends dynamically on the number of data transmitted on the network, and the data transfer time is inefficient owing to the longer latency of existing routing paths when nodes and switches fail. We propose deep Q-network erasure coding (DQN-EC) to solve routing problems by converging erasure coding with DQN to learn dynamically changing network elements. Using the SDN controller, DQN-EC collects the status, number, and block size of nodes possessing stored blocks during erasure coding. The fat-tree network topology used for experimental evaluation collects elements of typical network packets, the bandwidth of the nodes and switches, and other information. The data collected undergo deep reinforcement learning to avoid node and switch failures and provide optimized routing paths by selecting switches that efficiently conduct block transfers. DQN-EC achieves a 2.5-times-faster block transmission time and 0.4-times-higher network throughput than open shortest path first (OSPF) routing algorithms. The bottleneck bandwidth and transmission link cost can be reduced, improving the recovery time approximately twofold. Full article
Show Figures

Figure 1

Figure 1
<p>Encoding process of erasure coding.</p>
Full article ">Figure 2
<p>Decoding process of erasure coding.</p>
Full article ">Figure 3
<p>Q-learning process.</p>
Full article ">Figure 4
<p>Deep Q-network process.</p>
Full article ">Figure 5
<p>Example of a failure in a network routing path.</p>
Full article ">Figure 6
<p>Structure of the DQN-based EC network routing architecture.</p>
Full article ">Figure 7
<p>Example of applying EC to fat-tree network topology.</p>
Full article ">Figure 8
<p>Total reward based on number of episodes.</p>
Full article ">Figure 9
<p>Block transmission time based on the probability of a link failure.</p>
Full article ">Figure 10
<p>Network throughput based on the probability of a link failure.</p>
Full article ">Figure 11
<p>Graphs of <math display="inline"><semantics> <mrow> <mi>B</mi> <msub> <mi>B</mi> <mi>r</mi> </msub> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <mi>T</mi> <msub> <mi>L</mi> <mi>r</mi> </msub> </mrow> </semantics></math> by equation 11 as: (<b>a</b>) Bottleneck bandwidth based on number of decoding requests; (<b>b</b>) Transmission link cost based on number of decoding requests.</p>
Full article ">Figure 12
<p>Recovery time based on number of decoding requests.</p>
Full article ">
18 pages, 6711 KiB  
Article
A Study on Building a “Real-Time Vehicle Accident and Road Obstacle Notification Model” Using AI CCTV
by Chaeyoung Lee, Hyomin Kim, Sejong Oh and Illchul Doo
Appl. Sci. 2021, 11(17), 8210; https://doi.org/10.3390/app11178210 - 3 Sep 2021
Cited by 13 | Viewed by 6044
Abstract
This research produced a model that detects abnormal phenomena on the road, based on deep learning, and proposes a service that can prevent accidents because of other cars and traffic congestion. After extracting accident images based on traffic accident video data by using [...] Read more.
This research produced a model that detects abnormal phenomena on the road, based on deep learning, and proposes a service that can prevent accidents because of other cars and traffic congestion. After extracting accident images based on traffic accident video data by using FFmpeg for model production, car collision types are classified, and only the head-on collision types are processed by using the deep learning object-detection algorithm YOLO (You Only Look Once). Using the car accident detection model that we built and the provided road obstacle-detection model, we programmed, for when the model detects abnormalities on the road, warning notification and photos that captures the accidents or obstacles, which are then transferred to the application. The proposed service was verified through application notification simulations and virtual experiments using CCTVs in Daegu, Busan, and Gwangju. By providing services, the goal is to improve traffic safety and achieve the development of a self-driving vehicle sector. As a future research direction, it is suggested that an efficient CCTV control system be introduced for the transportation environment. Full article
Show Figures

Figure 1

Figure 1
<p>Traffic congestion costs by year.</p>
Full article ">Figure 2
<p>Service overview.</p>
Full article ">Figure 3
<p>Flow chart about the detection model and the DRAS alarm system.</p>
Full article ">Figure 4
<p>YOLO Network.</p>
Full article ">Figure 5
<p>YOLOV3 performance comparison.</p>
Full article ">Figure 6
<p>System Architecture.</p>
Full article ">Figure 7
<p>(<b>a</b>) An image of a traffic accident detected; (<b>b</b>) an image of an obstacle located on the road detected.</p>
Full article ">Figure 8
<p>(<b>a</b>) Web Application Startup Web Page; (<b>b</b>) Web page when ’Find Paths’ is pressed; (<b>c</b>) Web page when path is entered; (<b>d</b>) Web page when CCTV mark is pressed.</p>
Full article ">Figure 9
<p>Example of a map used in an experiment.</p>
Full article ">Figure 10
<p>(<b>a</b>) image of car accident; (<b>b</b>) image of obstacles on the road.</p>
Full article ">Figure 11
<p>(<b>a</b>) CCTV notification window at the northern end of Han River Bridge; (<b>b</b>) CCTV notification window at the southern end of Banpo Bridge.</p>
Full article ">Figure 12
<p>(<b>a</b>) The route from Dongjak Station to Hongik University Station; (<b>b</b>) the route from Seoul Express Bus Terminal to Seoul City Hall; (<b>c</b>) the route from Seoul Express Bus Terminal to Hongik University Station; (<b>d</b>) an image that shows that the user located at Gangnam Station has received a notification.</p>
Full article ">Figure 13
<p>(<b>a</b>) Accident detected by CCTV at the Gundeulbawi Intersection in Daegu; (<b>b</b>) accident detected at Gwangcheon Bridge 1 in Gwangju; (<b>c</b>) accident detected on the Busan Jurye Ramp Overpass.</p>
Full article ">
16 pages, 3253 KiB  
Article
Ambient Sound Recognition of Daily Events by Means of Convolutional Neural Networks and Fuzzy Temporal Restrictions
by Aurora Polo-Rodriguez, Jose Manuel Vilchez Chiachio, Cristiano Paggetti and Javier Medina-Quero
Appl. Sci. 2021, 11(15), 6978; https://doi.org/10.3390/app11156978 - 29 Jul 2021
Cited by 9 | Viewed by 2856
Abstract
The use of multimodal sensors to describe activities of daily living in a noninvasive way is a promising research field in continuous development. In this work, we propose the use of ambient audio sensors to recognise events which are generated from the activities [...] Read more.
The use of multimodal sensors to describe activities of daily living in a noninvasive way is a promising research field in continuous development. In this work, we propose the use of ambient audio sensors to recognise events which are generated from the activities of daily living carried out by the inhabitants of a home. An edge–fog computing approach is proposed to integrate the recognition of audio events with smart boards where the data are collected. To this end, we compiled a balanced dataset which was collected and labelled in controlled conditions. A spectral representation of sounds was computed using convolutional network inputs to recognise ambient sounds with encouraging results. Next, fuzzy processing of audio event streams was included in the IoT boards by means of temporal restrictions defined by protoforms to filter the raw audio event recognition, which are key in removing false positives in real-time event recognition. Full article
Show Figures

Figure 1

Figure 1
<p>(<b>Left</b>) Raspberry Pi B+ with USB microphone which sets up the IoT device for collecting and recognizing ambient sound events; (<b>Right</b>) mobile application for labelling of events together with NFC tag to facilitate data collection and labelling.</p>
Full article ">Figure 2
<p>Architecture of components for ambient sound recognition of daily living events. The real-time prediction of sound events was carried out in smart boards under an edge–fog computing approach.</p>
Full article ">Figure 3
<p>Example of raw audio signals at 44.1 kHz, log-Mel spectrogram (LM), and Mel-frequency cepstral coefficient (MFCC) of the ambient audio events: cutlery, blind, alarm clock, and door bell.</p>
Full article ">Figure 4
<p>Confusion matrices in ad hoc ambient audio dataset. (<b>Left</b>) CNN + MFCC; (<b>Right</b>) CNN + LM.</p>
Full article ">Figure 5
<p>Confusion matrices in Audioset dataset: (<b>Left</b>) CNN + MFCC; (<b>Right</b>) CNN + LM.</p>
Full article ">Figure 6
<p>Timeline of the six scenes of the case study: (<b>Up</b>) ground truth of the scene; (<b>Middle</b>) raw audio recognition from spectral and CNN models; (<b>Bottom</b>) fuzzy filtering of audio recognition with protoforms. In red circles are the isolated false positives or false negatives which describe incoherent event recognition.</p>
Full article ">
20 pages, 4493 KiB  
Article
Development of a Fuzzy Logic Controller for Small-Scale Solar Organic Rankine Cycle Cogeneration Plants
by Luca Cioccolanti, Simone De Grandis, Roberto Tascioni, Matteo Pirro and Alessandro Freddi
Appl. Sci. 2021, 11(12), 5491; https://doi.org/10.3390/app11125491 - 13 Jun 2021
Cited by 5 | Viewed by 2487
Abstract
Solar energy is widely recognized as one of the most attractive renewable energy sources to support the transition toward a decarbonized society. Use of low- and medium-temperature concentrated solar technologies makes decentralized power production of combined heating and power (CHP) an alternative to [...] Read more.
Solar energy is widely recognized as one of the most attractive renewable energy sources to support the transition toward a decarbonized society. Use of low- and medium-temperature concentrated solar technologies makes decentralized power production of combined heating and power (CHP) an alternative to conventional energy conversion systems. However, because of the changes in solar radiation and the inertia of the different subsystems, the operation control of concentrated solar power (CSP) plants is fundamental to increasing their overall conversion efficiency and improving reliability. Therefore, in this study, the operation control of a micro-scale CHP plant consisting of a linear Fresnel reflector solar field, an organic Rankine cycle unit, and a phase change material thermal energy storage tank, as designed and built under the EU-funded Innova Microsolar project by a consortium of universities and companies, is investigated. In particular, a fuzzy logic control is developed in MATLAB/Simulink by the authors in order to (i) initially recognize the type of user according to the related energy consumption profile by means of a neural network and (ii) optimize the thermal-load-following approach by introducing a set of fuzzy rules to switch among the different operation modes. Annual simulations are performed by combining the plant with different thermal load profiles. In general, the analysis shows that that the proposed fuzzy logic control increases the contribution of the TES unit in supplying the ORC unit, while reducing the number of switches between the different OMs. Furthermore, when connected with a residential user load profile, the overall electrical and thermal energy production of the plant increases. Hence, the developed control logic proves to have good potential in increasing the energy efficiency of low- and medium-temperature concentrated solar ORC systems when integrated into the built environment. Full article
Show Figures

Figure 1

Figure 1
<p>Scheme of the Innova Microsolar prototype plant.</p>
Full article ">Figure 2
<p>Scheme of the different operation modes of the prototype plant.</p>
Full article ">Figure 3
<p>Scheme of the organic Rankine cycle.</p>
Full article ">Figure 4
<p>Membership functions of variables P<sub>LFR,out</sub> (<b>a</b>), T<sub>TES,av</sub> (<b>b</b>), T<sub>LFR,out</sub> (<b>c</b>), Time (<b>d</b>), T<sub>diff</sub> (<b>e</b>), and System<sub>info</sub> (<b>f</b>).</p>
Full article ">Figure 5
<p>Simulink scheme for the creation of the System<sub>info</sub> variable.</p>
Full article ">Figure 6
<p>Inputs and outputs of the neural network for load-type classification.</p>
Full article ">Figure 7
<p>Confusion matrices for load-type classification by the ANN.</p>
Full article ">Figure 8
<p>Daily trend of plant performance coupled with a school building load profile: (<b>a</b>) sunny winter day in the case of a baseline controller, (<b>b</b>) sunny winter day in the case of a fuzzy logic controller, (<b>c</b>) partially cloudy mid-season day in the case of a baseline controller, and (<b>d</b>) partially cloudy mid-season day in the case of a fuzzy logic controller.</p>
Full article ">Figure 9
<p>Daily trend of TES temperature and exchanged power when coupled with a school building load profile: (<b>a</b>) sunny winter day in the case of a baseline controller, (<b>b</b>) sunny winter day in the case of a fuzzy logic controller, (<b>c</b>) partially cloudy mid-season day in the case of a baseline controller, and (<b>d</b>) partially cloudy mid-season day in the case of a fuzzy logic controller.</p>
Full article ">Figure 9 Cont.
<p>Daily trend of TES temperature and exchanged power when coupled with a school building load profile: (<b>a</b>) sunny winter day in the case of a baseline controller, (<b>b</b>) sunny winter day in the case of a fuzzy logic controller, (<b>c</b>) partially cloudy mid-season day in the case of a baseline controller, and (<b>d</b>) partially cloudy mid-season day in the case of a fuzzy logic controller.</p>
Full article ">Figure 10
<p>Daily trend of plant performance coupled with a residential user load profile: (<b>a</b>) sunny winter day in the case of a baseline controller and (<b>b</b>) sunny winter day in the case of a fuzzy logic controller.</p>
Full article ">Figure 11
<p>Daily trend of TES temperature and exchanged power when coupled with a residential user load profile: (<b>a</b>) sunny winter day in the case of a baseline controller and (<b>b</b>) sunny winter day in the case of a fuzzy logic controller.</p>
Full article ">
15 pages, 1376 KiB  
Article
A Modified Quad Q Network Algorithm for Predicting Resource Management
by Yeonggwang Kim, Jaehyung Park, Jinyoung Kim, Junchurl Yoon, Sangjoon Lee and Jinsul Kim
Appl. Sci. 2021, 11(11), 5154; https://doi.org/10.3390/app11115154 - 1 Jun 2021
Viewed by 2647
Abstract
As the resource management systems continues to grow, the resource distribution system is expected to expand steadily. The demand response system enables producers to reduce the consumption costs of an enterprise during fluctuating periods in order balance the supply grid and resell the [...] Read more.
As the resource management systems continues to grow, the resource distribution system is expected to expand steadily. The demand response system enables producers to reduce the consumption costs of an enterprise during fluctuating periods in order balance the supply grid and resell the remaining resources of the product to generate revenue. Q-learning, a reinforcement learning algorithm based on a resource distribution compensation mechanism, is used to make optimal decisions to schedule the operation of smart factory appliances. In this paper, we proposed an effective resource management system for enterprise demand response using a Quad Q Network algorithm. The proposed algorithm is based on a Deep Q Network algorithm that directly integrates supply-demand inputs into control logic and employs fuzzy inference as a reward mechanism. In addition to using uses the Compare Optimizer method to reduce the loss value of the proposed Q Network Algorithm, Quad Q Network also maintains a high accuracy with fewer epochs. The proposed algorithm was applied to market capitalization data obtained from Google and Apple. Also, we verified that the Compare Optimizer used in Quad Q Network derives the minimum loss value through the double operation of Double Q value. Full article
Show Figures

Figure 1

Figure 1
<p>A figure showing the DQN network structure in Grid World. Below shows Dueling DQN.</p>
Full article ">Figure 2
<p>A figure showing Dueling DQN into two terms from the point of view of a Value stream and an Advantage stream.</p>
Full article ">Figure 3
<p>The process of extracting Target Q Value by adding Q1, Q2 Network, the idea of the Double DQN algorithm, to a Dueling DQN algorithm.</p>
Full article ">Figure 4
<p>Quad Q Network plot created by duplicating Q1 and Q2, followed by two <span class="html-italic">argmax</span> processes and comparison of Loss values.</p>
Full article ">Figure 5
<p>A graph for visualizing the overall value of Total Resource on Google.</p>
Full article ">Figure 6
<p>Learning results by substituting the DQN algorithm based on the proposed Total Resource on Google.</p>
Full article ">Figure 7
<p>Learning results by substituting the Dueling DQN algorithm based on the proposed Total Resource on Google.</p>
Full article ">Figure 8
<p>Learning results by substituting the Double Dueling DQN algorithm based on the proposed Total Resource on Google.</p>
Full article ">Figure 9
<p>Learning results by substituting the Quad Q Network algorithm based on the proposed Total Resource on Google.</p>
Full article ">Figure 10
<p>Comparative analysis of the proposed Q Network reward for the value of Total Resource on Google.</p>
Full article ">Figure 11
<p>Learning results by substituting the DQN algorithm based on the proposed Total Resource on Apple.</p>
Full article ">Figure 12
<p>Learning results by substituting the Dueling DQN algorithm based on the proposed Total Resource on Apple.</p>
Full article ">Figure 13
<p>Learning results by substituting the Double Dueling DQN algorithm based on the proposed Total Resource on Apple.</p>
Full article ">Figure 14
<p>Learning results by substituting the Quad Q Network algorithm based on the proposed Total Resource on Apple.</p>
Full article ">Figure 15
<p>Comparative analysis of the proposed Q Network reward for the value of Total Resource on Apple.</p>
Full article ">
20 pages, 14051 KiB  
Article
Using Fuzzy Control for Feed Rate Scheduling of Computer Numerical Control Machine Tools
by Cheng-Jian Lin, Chun-Hui Lin and Shyh-Hau Wang
Appl. Sci. 2021, 11(10), 4701; https://doi.org/10.3390/app11104701 - 20 May 2021
Cited by 10 | Viewed by 2835
Abstract
In industrial processing, workpiece quality and processing time have recently become important issues. To improve the machining accuracy and reduce the cutting time, the cutting feed rate will have a significant impact. Therefore, how to plan a dynamic cutting feed rate is very [...] Read more.
In industrial processing, workpiece quality and processing time have recently become important issues. To improve the machining accuracy and reduce the cutting time, the cutting feed rate will have a significant impact. Therefore, how to plan a dynamic cutting feed rate is very important. In this study, a fuzzy control system for feed rate scheduling based on the curvature and curvature variation is proposed. The proposed system is implemented in actual cutting, and to verify the data an optical three-dimensional scanner is used to measure the cutting trajectory of the workpiece. Experimental results prove that the proposed fuzzy control system for dynamic cutting feed rate scheduling increases the cutting accuracy by 41.8% under the same cutting time; moreover, it decreases the cutting time by 50.8% under approximately the same cutting accuracy. Full article
Show Figures

Figure 1

Figure 1
<p>Procedure of fuzzy control for feed rate scheduling.</p>
Full article ">Figure 2
<p>Five-axis CNC processing machine used in this study.</p>
Full article ">Figure 3
<p>Curvature defined by three coordinate points.</p>
Full article ">Figure 4
<p>Architecture of fuzzy controller for dynamic feed rate scheduling.</p>
Full article ">Figure 5
<p>Membership functions of (<b>a</b>) curvature, (<b>b</b>) curvature variation, and (<b>c</b>) feed rate.</p>
Full article ">Figure 6
<p>Schematic diagram of machining feed rates.</p>
Full article ">Figure 7
<p>Experimental cutting graphs: (<b>a</b>) ∞ shape, (<b>b</b>) trident shape, and (<b>c</b>) butterfly shape.</p>
Full article ">Figure 8
<p>(<b>a</b>) Curvature and (<b>b</b>) curvature variation of ∞ shape.</p>
Full article ">Figure 9
<p>(<b>a</b>) Curvature and (<b>b</b>) curvature variation of trident shape.</p>
Full article ">Figure 10
<p>(<b>a</b>) Curvature and (<b>b</b>) curvature variation of butterfly shape.</p>
Full article ">Figure 11
<p>(<b>a</b>) Cutting of aluminum workpiece and (<b>b</b>) aluminum workpiece after cutting.</p>
Full article ">Figure 12
<p>(<b>a</b>) Flowchart of optical 3D scanner measurement, (<b>b</b>) spraying of developing powder, (<b>c</b>) scanning using optical 3D scanner, and (<b>d</b>) 3D graphics after scanning aluminum workpieces.</p>
Full article ">Figure 13
<p>Theorical cutting path error calculation.</p>
Full article ">Figure 14
<p>Cutting ∞ shape using method by Luan et al. [<a href="#B9-applsci-11-04701" class="html-bibr">9</a>]: (<b>a</b>) feed rate, (<b>b</b>) acceleration, and (<b>c</b>) jerk.</p>
Full article ">Figure 15
<p>Cutting ∞ shape using method by Yeh and Hsu [<a href="#B10-applsci-11-04701" class="html-bibr">10</a>]: (<b>a</b>) feed rate, (<b>b</b>) acceleration, and (<b>c</b>) jerk.</p>
Full article ">Figure 16
<p>Cutting ∞ shape using method by Giannelli et al. [<a href="#B11-applsci-11-04701" class="html-bibr">11</a>]: (<b>a</b>) feed rate, (<b>b</b>) acceleration, and (<b>c</b>) jerk.</p>
Full article ">Figure 17
<p>Cutting ∞ shape using our method: (<b>a</b>) feed rate, (<b>b</b>) acceleration, and (<b>c</b>) jerk.</p>
Full article ">Figure 18
<p>Cutting trident shape using method by Luan et al. [<a href="#B9-applsci-11-04701" class="html-bibr">9</a>]: (<b>a</b>) feed rate, (<b>b</b>) acceleration, and (<b>c</b>) jerk.</p>
Full article ">Figure 19
<p>Cutting trident shape using method by Yeh and Hsu [<a href="#B10-applsci-11-04701" class="html-bibr">10</a>]: (<b>a</b>) feed rate, (<b>b</b>) acceleration, and (<b>c</b>) jerk.</p>
Full article ">Figure 20
<p>Cutting trident shape using method by Giannelli et al. [<a href="#B11-applsci-11-04701" class="html-bibr">11</a>]: (<b>a</b>) feed rate, (<b>b</b>) acceleration, and (<b>c</b>) jerk.</p>
Full article ">Figure 21
<p>Cutting trident shape using our method with maximum feed rate of 150 mm/min: (<b>a</b>) feed rate, (<b>b</b>) acceleration, and (<b>c</b>) jerk.</p>
Full article ">Figure 22
<p>Cutting trident shape using our method with maximum feed rate of 300 mm/min: (<b>a</b>) feed rate, (<b>b</b>) acceleration, and (<b>c</b>) jerk.</p>
Full article ">Figure 23
<p>Jerk when cutting trident shape using (<b>a</b>) method by Luan et al. [<a href="#B9-applsci-11-04701" class="html-bibr">9</a>], (<b>b</b>) method by Yeh and Hsu [<a href="#B10-applsci-11-04701" class="html-bibr">10</a>], (<b>c</b>) our method with maximum feed rate of 150 m/min, and (<b>d</b>) our method with maximum feed rate of 300 mm/min.</p>
Full article ">Figure 24
<p>Cutting butterfly shape using method by Luan et al. [<a href="#B9-applsci-11-04701" class="html-bibr">9</a>]: (<b>a</b>) feed rate, (<b>b</b>) acceleration, and (<b>c</b>) jerk.</p>
Full article ">Figure 25
<p>Cutting butterfly shape using method by Yeh and Hsu [<a href="#B10-applsci-11-04701" class="html-bibr">10</a>]: (<b>a</b>) feed rate, (<b>b</b>) acceleration, and (<b>c</b>) jerk.</p>
Full article ">Figure 26
<p>Cutting butterfly shape using method by Giannelli et al. [<a href="#B11-applsci-11-04701" class="html-bibr">11</a>]: (<b>a</b>) feed rate, (<b>b</b>) acceleration, and (<b>c</b>) jerk.</p>
Full article ">Figure 27
<p>Cutting butterfly shape using our method with maximum feed rate of 58 mm/min: (<b>a</b>) feed rate, (<b>b</b>) acceleration, and (<b>c</b>) jerk.</p>
Full article ">Figure 28
<p>Cutting butterfly shape using our method with maximum feed rate of 185 mm/min: (<b>a</b>) feed rate, (<b>b</b>) acceleration, and (<b>c</b>) jerk.</p>
Full article ">Figure 29
<p>Cutting butterfly shapes using our method with maximum feed rate of 300 mm/min: (<b>a</b>) feed rate, (<b>b</b>) acceleration, and (<b>c</b>) jerk.</p>
Full article ">
26 pages, 4825 KiB  
Article
Bearing Anomaly Recognition Using an Intelligent Digital Twin Integrated with Machine Learning
by Farzin Piltan and Jong-Myon Kim
Appl. Sci. 2021, 11(10), 4602; https://doi.org/10.3390/app11104602 - 18 May 2021
Cited by 49 | Viewed by 4240
Abstract
In this study, the application of an intelligent digital twin integrated with machine learning for bearing anomaly detection and crack size identification will be observed. The intelligent digital twin has two main sections: signal approximation and intelligent signal estimation. The mathematical vibration bearing [...] Read more.
In this study, the application of an intelligent digital twin integrated with machine learning for bearing anomaly detection and crack size identification will be observed. The intelligent digital twin has two main sections: signal approximation and intelligent signal estimation. The mathematical vibration bearing signal approximation is integrated with machine learning-based signal approximation to approximate the bearing vibration signal in normal conditions. After that, the combination of the Kalman filter, high-order variable structure technique, and adaptive neural-fuzzy technique is integrated with the proposed signal approximation technique to design an intelligent digital twin. Next, the residual signals will be generated using the proposed intelligent digital twin and the original RAW signals. The machine learning approach will be integrated with the proposed intelligent digital twin for the classification of the bearing anomaly and crack sizes. The Case Western Reserve University bearing dataset is used to test the impact of the proposed scheme. Regarding the experimental results, the average accuracy for the bearing fault pattern recognition and crack size identification will be, respectively, 99.5% and 99.6%. Full article
Show Figures

Figure 1

Figure 1
<p>Proposed intelligent digital twin integrated with machine learning for bearing anomaly classification.</p>
Full article ">Figure 2
<p>Experimental testbed for the bearing data acquisition implemented by CWRUBD [<a href="#B10-applsci-11-04602" class="html-bibr">10</a>,<a href="#B40-applsci-11-04602" class="html-bibr">40</a>].</p>
Full article ">Figure 3
<p>The CWRUD bearing vibration signals for NS, RFS, IFS, and OFS when the motor torque loads vary from 0 to 3 hp; moreover, the crack sizes for abnormal conditions are 0.007, 0.014, and 0.021 inch.</p>
Full article ">Figure 4
<p>The original normal RAW signal and the modeled signal using proposed (MS) scheme.</p>
Full article ">Figure 5
<p>The error of the bearing normal signal modeling for the digital twin using four algorithms: AUT method, AUT-LAG technique, SAL approach, and proposed (MS) scheme.</p>
Full article ">Figure 6
<p>The frequency response of original normal signal and modeled normal signal using covariance power spectral density estimation.</p>
Full article ">Figure 7
<p>Bode plot for original normal signal.</p>
Full article ">Figure 8
<p>Bode plot for modeled normal signal.</p>
Full article ">Figure 9
<p>Impulse response estimated plot for original normal signal.</p>
Full article ">Figure 10
<p>Impulse response estimated plot for modeled normal signal.</p>
Full article ">Figure 11
<p>The residual signals of the bearing using the MS-KF algorithm when the motor torque loads vary from 0 to 3 hp; moreover, the crack sizes for abnormal conditions are 0.007, 0.014, and 0.021 inch.</p>
Full article ">Figure 12
<p>The residual signals of the bearing using the MS-RKF algorithm when the motor torque loads vary from 0 to 3 hp; moreover, the crack sizes for abnormal conditions are 0.007, 0.014, and 0.021 inch.</p>
Full article ">Figure 13
<p>The residual signals of the bearing using the proposed digital twin (MS-HRKF) algorithm when the motor torque loads vary from 0 to 3 hp; moreover, the crack sizes for abnormal conditions are 0.007, 0.014, and 0.021 inch: (<b>a</b>) all cases and (<b>b</b>) zoom view for NS and RFS.</p>
Full article ">Figure 14
<p>The frequency response of power spectral density estimation for NS, RFS, IFS, and OFS using the proposed method.</p>
Full article ">Figure 15
<p>RMS resampled residual signal using the proposed digital twin (MS-HRKF) algorithm when the motor torque loads vary from 0 to 3 hp; moreover, the crack sizes for abnormal conditions are 0.007, 0.014, and 0.021 inch.</p>
Full article ">Figure 16
<p>Confusion matrices for FPR using the proposed digital twin integrated with the SVM (MS-HRKF+SVM) technique.</p>
Full article ">Figure 17
<p>Confusion matrices for FPR using the combination of the MS-RKF with SVM (MS-RKF+SVM) technique.</p>
Full article ">Figure 18
<p>Confusion matrices for FPR using the combination of the MS-KF with SVM (MS-KF+SVM) technique.</p>
Full article ">Figure 19
<p>Boxplots of the average FPRA metrics over 10 experiments for the proposed digital twin integrated with SVM (MS-HRKF+SVM), the MS-RKF+SVM, and the MS-KF+SVM to test the power of robustness.</p>
Full article ">Figure 20
<p>Boxplots of the average CSI metrics over 10 experiments for the MS-HRKF+SVM, the MS-RKF+SVM, and the MS-KF+SVM to test the power of robustness.</p>
Full article ">
26 pages, 10167 KiB  
Article
Building an Operational Solution Assistant System for Foreign SMEs in ROK
by Hong-Danh Thai and Jun-Ho Huh
Appl. Sci. 2021, 11(10), 4510; https://doi.org/10.3390/app11104510 - 15 May 2021
Cited by 2 | Viewed by 3362
Abstract
Foreign Direct Investment (FDI) is an important resource that helps accelerate the development of the country’s economy, add substantial funding to growth and facilitate technology transfer. Republic of Korea (ROK) is one of the world’s developed countries with dynamic economy, advanced science and [...] Read more.
Foreign Direct Investment (FDI) is an important resource that helps accelerate the development of the country’s economy, add substantial funding to growth and facilitate technology transfer. Republic of Korea (ROK) is one of the world’s developed countries with dynamic economy, advanced science and technology. In recent years, the Korean government has continuously formulated tax policies, policies to support the business economy and import policies to support foreign businesses in Korea. The Pangyo Valley Creative Economy Valley is being groomed as a global startup hub in Asia. Small and medium enterprises (SMEs) in foreign countries are increasingly interested and eager to seek investment opportunities in the Korean market. Nonetheless, for these companies, language barriers and cultural and institutional differences make it more difficult and time-consuming to learn about the Korean market (such as investment trends, laws, visa policies, taxes and business establishment issues in Korea, etc.). In this study, we explored the process of searching information and seeking investment opportunities and built a business consulting and support application in the first stages of starting a business in ROK to increase effectiveness and save time, which is also an innovative business practice in Use-case ROK. We designed our Virtual Assistant system that can crawl and analyze data on foreign investments in ROK from open data resource websites (data.co.kr) and used analytic and aggregation techniques to explore trends in investments of foreign enterprises. We also researched the process of searching information and seeking investment opportunities for SMEs when investing in ROK, government support policies, laws and taxes as well as a number of other related issues. We built datasets and used Natural Language Processing (NLP) together with Natural Language Understanding (NLU) algorithms to build chatbot applications. Friendly framework for new developers to add and build up the dataset of AI Assistant is built by providing input intent data function, input Entity data function, input utterance data function as well as training and test function. In addition, we built a web-app connected to the server to visualize all the results of research so that SMEs owners can easily use and look for information on investments. Based on the research results, we can make recommendations to SMEs in keeping with the changing investment trends in ROK. Full article
Show Figures

Figure 1

Figure 1
<p>Foreign-invested companies in Korea.</p>
Full article ">Figure 2
<p>Most important challenges that small and medium business owners face in ROK (South Korea) as of April 2018 (<span class="html-italic">Source: Future of Business Survey; OECD; World Bank; Facebook; FactWorks</span>) [<a href="#B4-applsci-11-04510" class="html-bibr">4</a>].</p>
Full article ">Figure 3
<p>Information that new foreign investors in Korea.</p>
Full article ">Figure 4
<p>Proposed architecture of the Operational Solution Assistant system.</p>
Full article ">Figure 5
<p>AI Assistant’s main workflow.</p>
Full article ">Figure 6
<p>Process of defining Intent.</p>
Full article ">Figure 7
<p>Process of defining Entity.</p>
Full article ">Figure 8
<p>Process of defining Utterance.</p>
Full article ">Figure 9
<p>Flowchart of chatbot.</p>
Full article ">Figure 10
<p>UML framework of the Operational Solution Assistant system.</p>
Full article ">Figure 11
<p>Input interface of chatbot intent data.</p>
Full article ">Figure 12
<p>Input interface of chatbot Entity data.</p>
Full article ">Figure 13
<p>Input interface of chatbot utterance data.</p>
Full article ">Figure 14
<p>Data set sample of Intent.</p>
Full article ">Figure 15
<p>Data set sample of Entity.</p>
Full article ">Figure 16
<p>Data set sample of Utterance.</p>
Full article ">Figure 17
<p>Intents’ dataset stored in MongoDB.</p>
Full article ">Figure 18
<p>Training model and test function.</p>
Full article ">Figure 19
<p>Korea Public Data Portal (Source: <a href="http://data.go.kr" target="_blank">data.go.kr</a> (accessed on 24 July 2020)).</p>
Full article ">Figure 20
<p>Databases of Invest attraction data.</p>
Full article ">Figure 21
<p>Metadata of Invest attraction data.</p>
Full article ">Figure 22
<p>Data analysis of investment trends.</p>
Full article ">Figure 22 Cont.
<p>Data analysis of investment trends.</p>
Full article ">Figure 23
<p>Data statistics of investment trends.</p>
Full article ">Figure 24
<p>Data analysis of the supported industry.</p>
Full article ">Figure 25
<p>Data statistics of the supported industry.</p>
Full article ">Figure 26
<p>Assistant Application providing legal information.</p>
Full article ">Figure 27
<p>Assistant Application answering the question on the industry most supported in Busan.</p>
Full article ">Figure 28
<p>Assistant Systems providing information about other companies in Korea.</p>
Full article ">Figure 29
<p>Assistant Systems providing information about the country investing the most in Korea.</p>
Full article ">
14 pages, 5108 KiB  
Article
Level-Based Learning Algorithm Based on the Difficulty Level of the Test Problem
by You-Sik Hong, Chang-Pyoung Han and Seong-Soo Cho
Appl. Sci. 2021, 11(10), 4380; https://doi.org/10.3390/app11104380 - 12 May 2021
Cited by 2 | Viewed by 2426
Abstract
These days, because of the coronavirus, all countries are introducing online university systems. Online universities have the advantage of allowing students to take classes anytime, anywhere, 24 h a day, but lectures are given in a non-face-to-face manner between instructors and students. Thus, [...] Read more.
These days, because of the coronavirus, all countries are introducing online university systems. Online universities have the advantage of allowing students to take classes anytime, anywhere, 24 h a day, but lectures are given in a non-face-to-face manner between instructors and students. Thus, while students are taking classes on a web-based basis, the problem arises that concentration on the lectures is significantly reduced. Therefore, in order to solve these problems, in this paper, we propose a level-wise learning algorithm based on the difficulty level of the test problem, and we present the simulation results. In order to improve this problem, in this paper, we propose an automatic music recommendation algorithm based on fuzzy reasoning that can improve the level of learning and lecture concentration, and we show our results on developing a web-based, smart e-learning software. As a result of computer simulation, it was proved that the learning test method, considering by level the difficulty of the test and the incorrect answer rate, was more effective than the existing test method, judged the student’s grades fairly, and improved the risk of unfairly failing the test by 30%. Full article
Show Figures

Figure 1

Figure 1
<p>Concepts of level test.</p>
Full article ">Figure 2
<p>Simulation result of level test.</p>
Full article ">Figure 3
<p>Art therapy scale test.</p>
Full article ">Figure 4
<p>Fuzzy system method.</p>
Full article ">Figure 5
<p>Flow chart of level test based on fuzzy rules.</p>
Full article ">Figure 6
<p>Test score evaluation screen.</p>
Full article ">Figure 7
<p>Automatic test question projection simulation.</p>
Full article ">Figure 8
<p>Computer simulation result.</p>
Full article ">Figure 9
<p>Computer simulation of automatic recommendation of study method.</p>
Full article ">Figure 10
<p>Level test and automatic textbook recommendation.</p>
Full article ">Figure 11
<p>Automatic judgment of wrong answer rate.</p>
Full article ">
15 pages, 3684 KiB  
Article
A Technique of Recursive Reliability-Based Missing Data Imputation for Collaborative Filtering
by Sun-Young Ihm, Shin-Eun Lee, Young-Ho Park, Aziz Nasridinov, Miyeon Kim and So-Hyun Park
Appl. Sci. 2021, 11(8), 3719; https://doi.org/10.3390/app11083719 - 20 Apr 2021
Cited by 5 | Viewed by 2743
Abstract
Collaborative filtering (CF) is a recommendation technique that analyzes the behavior of various users and recommends the items preferred by users with similar preferences. However, CF methods suffer from poor recommendation accuracy when the user preference data used in the recommendation process is [...] Read more.
Collaborative filtering (CF) is a recommendation technique that analyzes the behavior of various users and recommends the items preferred by users with similar preferences. However, CF methods suffer from poor recommendation accuracy when the user preference data used in the recommendation process is sparse. Data imputation can alleviate the data sparsity problem by substituting a virtual part of the missing user preferences. In this paper, we propose a k-recursive reliability-based imputation (k-RRI) that first selects data with high reliability and then recursively imputes data with additional selection while gradually lowering the reliability criterion. We also propose a new similarity measure that weights common interests and indifferences between users and items. The proposed method can overcome disregarding the importance of missing data and resolve the problem of poor data imputation of existing methods. The experimental results demonstrate that the proposed approach significantly improves recommendation accuracy compared to those resulting from the state-of-the-art methods while demanding less computational complexity. Full article
Show Figures

Figure 1

Figure 1
<p>An example of user similarity matrix of k-RRI.</p>
Full article ">Figure 2
<p>An example of item similarity matrix of k-RRI.</p>
Full article ">Figure 3
<p>An example of missing data imputation of k-RRI.</p>
Full article ">Figure 4
<p>An example of missing data imputation of k-RRI (step 2).</p>
Full article ">Figure 5
<p>An example of missing data imputation of k-RRI (step 3).</p>
Full article ">Figure 6
<p>The prediction accuracy of missing data imputation algorithms.</p>
Full article ">Figure 7
<p>The prediction accuracy of k-RRI as number of k values varies.</p>
Full article ">
23 pages, 9055 KiB  
Article
Erasure-Coding-Based Storage and Recovery for Distributed Exascale Storage Systems
by Jeong-Joon Kim
Appl. Sci. 2021, 11(8), 3298; https://doi.org/10.3390/app11083298 - 7 Apr 2021
Cited by 6 | Viewed by 3213
Abstract
Various techniques have been used in distributed file systems for data availability and stability. Typically, a method for storing data in a replication technique-based distributed file system is used, but due to the problem of space efficiency, an erasure-coding (EC) technique has been [...] Read more.
Various techniques have been used in distributed file systems for data availability and stability. Typically, a method for storing data in a replication technique-based distributed file system is used, but due to the problem of space efficiency, an erasure-coding (EC) technique has been utilized more recently. The EC technique improves the space efficiency problem more than the replication technique does. However, the EC technique has various performance degradation factors, such as encoding and decoding and input and output (I/O) degradation. Thus, this study proposes a buffering and combining technique in which various I/O requests that occurred during encoding in an EC-based distributed file system are combined into one and processed. In addition, it proposes four recovery measures (disk input/output load distribution, random block layout, multi-thread-based parallel recovery, and matrix recycle technique) to distribute the disk input/output loads generated during decoding. Full article
Show Figures

Figure 1

Figure 1
<p>Single input/output (I/O) process in erasure coding (EC)-based Hadoop distributed file system (HDFS).</p>
Full article ">Figure 2
<p>Multiple I/O process in the EC-based HDFS.</p>
Full article ">Figure 3
<p>Process of distributing blocks in the EC-based HDFS system.</p>
Full article ">Figure 4
<p>Examples of clustering (<b>left</b>) and nonclustering (<b>right</b>) storage modes.</p>
Full article ">Figure 5
<p>Disk usage in DataNode 1 during single-thread fault recovery.</p>
Full article ">Figure 6
<p>Disk usage in DataNode 1 during multithread fault recovery.</p>
Full article ">Figure 7
<p>I/O buffering step.</p>
Full article ">Figure 8
<p>Method in the I/O buffering step.</p>
Full article ">Figure 9
<p>I/O combining step.</p>
Full article ">Figure 10
<p>Method in the I/O combining step.</p>
Full article ">Figure 11
<p>I/O combining algorithm.</p>
Full article ">Figure 12
<p>Example of disk loads due to parallel recovery.</p>
Full article ">Figure 13
<p>Disk I/O load distribution algorithm.</p>
Full article ">Figure 14
<p>Example of disk contention avoidance due to parallel recovery.</p>
Full article ">Figure 15
<p>Rules for creating a new block.</p>
Full article ">Figure 16
<p>Examples of sequential (<b>left</b>) and random (<b>right</b>) block placement disk fault.</p>
Full article ">Figure 17
<p>Case where matrices differ in a single fault.</p>
Full article ">Figure 18
<p>Data structure to compose the matrix.</p>
Full article ">Figure 19
<p>Matrix recycle step.</p>
Full article ">Figure 20
<p>Comparison between EC-based HDFS and improvement-applied performances.</p>
Full article ">Figure 21
<p>Difference in storage time according to file size.</p>
Full article ">Figure 22
<p>Comparison of recovery performance according to the number of recovery threads.</p>
Full article ">Figure 23
<p>Disk usage of the EC HDFS (<b>left</b>) and the EC HDFS-LR (<b>right</b>).</p>
Full article ">Figure 24
<p>Performance comparison according to the block placement technique between the EC HDFS and the EC HDFS-LR.</p>
Full article ">Figure 25
<p>Memory size (KB) needed for matrix storage.</p>
Full article ">Figure 26
<p>Performance comparison according to the matrix recycle.</p>
Full article ">
19 pages, 21225 KiB  
Article
A New Switching Adaptive Fuzzy Controller with an Application to Vibration Control of a Vehicle Seat Suspension Subjected to Disturbances
by Do Xuan Phu, Van Mien and Seung-Bok Choi
Appl. Sci. 2021, 11(5), 2244; https://doi.org/10.3390/app11052244 - 3 Mar 2021
Cited by 9 | Viewed by 2536
Abstract
This paper proposes a new switching adaptive fuzzy controller and applies it to vibration control of a vehicle seat suspension equipped with a semi-active magnetorheological (MR) damper. The proposed control system consists of three functioned filters: (1) Filter 1: a model of interval [...] Read more.
This paper proposes a new switching adaptive fuzzy controller and applies it to vibration control of a vehicle seat suspension equipped with a semi-active magnetorheological (MR) damper. The proposed control system consists of three functioned filters: (1) Filter 1: a model of interval type 2 fuzzy to compensate disturbances; (2) Filter 2: a ‘switching term’ to evaluate the magnitude of disturbance; and (3) Filter 3: a group of adaptation laws to enhance the robustness of control input. These filters play a role of powerful shields to improve control performance and guarantee the stability of the applied system subjected to external disturbances. After embedding a PID (proportional-integral-derivative) model into Riccati-like equation, main control parameters are updated based on the adaptation laws. The proposed controller is then synthesized in two different cases: high disturbance and small disturbance. For the high disturbance, a special type of sliding surface function, which relates to an exponential function and its t-norm, is used to increase the energy of control system. For the small disturbance, the energy from the modified t-norm of the sliding surface is neglected to reduce the energy consumption with maintaining the desired performance. To demonstrate the effectiveness of the proposed controller, a vehicle seat suspension installed with controllable MR damper is adopted to reflect the robustness against external disturbances corresponding to road excitations. It is validated from computer simulation that the proposed controller can provide better vibration control performance than other existing robust controllers showing excellent control stability with well-reduced displacement and velocity at the position of the seat. Full article
Show Figures

Figure 1

Figure 1
<p>Control strategy of the proposed controller: (<b>a</b>) block diagram, (<b>b</b>) control process.</p>
Full article ">Figure 1 Cont.
<p>Control strategy of the proposed controller: (<b>a</b>) block diagram, (<b>b</b>) control process.</p>
Full article ">Figure 2
<p>Mechanical model of the vehicle seat suspension with magnetorheological (MR) damper.</p>
Full article ">Figure 3
<p>Random step wave road excitation.</p>
Full article ">Figure 4
<p>Displacement and velocity of the seat system using the proposed controller: (<b>a</b>,<b>b</b>) general view, (<b>c</b>,<b>d</b>) enlarged view.</p>
Full article ">Figure 5
<p>Displacement and velocity of the seat system of the Compared Controller 1: (<b>a</b>,<b>b</b>) general view, (<b>c</b>,<b>d</b>) enlarged view.</p>
Full article ">Figure 5 Cont.
<p>Displacement and velocity of the seat system of the Compared Controller 1: (<b>a</b>,<b>b</b>) general view, (<b>c</b>,<b>d</b>) enlarged view.</p>
Full article ">Figure 6
<p>Displacement and velocity of seat system of the Compared Controller 2: (<b>a</b>,<b>b</b>) general view, (<b>c</b>,<b>d</b>) enlarged view.</p>
Full article ">Figure 7
<p>Damping force control: (<b>a</b>) proposed controller, (<b>b</b>) Compared Controller 1, (<b>c</b>) Compared Controller 2.</p>
Full article ">Figure 8
<p>Prescribed performance of the proposed controller: (<b>a</b>) general view, (<b>b</b>) enlarged view.</p>
Full article ">Figure 9
<p>Switching index of the proposed controller: (<b>a</b>) general view, (<b>b</b>) enlarged view.</p>
Full article ">
22 pages, 12738 KiB  
Article
A Comparison of Fuzzy-Based Energy Management Systems Adjusted by Nature-Inspired Algorithms
by Diego Arcos-Aviles, Diego Pacheco, Daniela Pereira, Gabriel Garcia-Gutierrez, Enrique V. Carrera, Alexander Ibarra, Paúl Ayala, Wilmar Martínez and Francesc Guinjoan
Appl. Sci. 2021, 11(4), 1663; https://doi.org/10.3390/app11041663 - 12 Feb 2021
Cited by 12 | Viewed by 2728
Abstract
The growing energy demand around the world has increased the usage of renewable energy sources (RES) such as photovoltaic and wind energies. The combination of traditional power systems and RESs has generated diverse problems due especially to the stochastic nature of RESs. Microgrids [...] Read more.
The growing energy demand around the world has increased the usage of renewable energy sources (RES) such as photovoltaic and wind energies. The combination of traditional power systems and RESs has generated diverse problems due especially to the stochastic nature of RESs. Microgrids (MG) arise to address these types of problems and to increase the penetration of RES to the utility network. A microgrid includes an energy management system (EMS) to operate its components and energy sources efficiently. The objectives pursued by the EMS are usually economically related to minimizing the operating costs of the MG or maximizing its income. However, due to new regulations of the network operators, a new objective related to the minimization of power peaks and fluctuations in the power profile exchanged with the utility network has taken great interest in recent years. In this regard, EMSs based on off-line trained fuzzy logic control (FLC) have been proposed as an alternative approach to those based on on-line optimization mixed-integer linear (or nonlinear) programming to reduce computational efforts. However, the procedure to adjust the FLC parameters has been barely addressed. This parameter adjustment is an optimization problem itself that can be formulated in terms of a cost/objective function and is susceptible to being solved by metaheuristic nature-inspired algorithms. In particular, this paper evaluates a methodology for adjusting the FLC parameters of the EMS of a residential microgrid that aims to minimize the power peaks and fluctuations on the power profile exchanged with the utility network through two nature-inspired algorithms, namely particle swarm optimization and differential evolution. The methodology is based on the definition of a cost function to be optimized. Numerical simulations on a specific microgrid example are presented to compare and evaluate the performances of these algorithms, also including a comparison with other ones addressed in previous works such as the Cuckoo search approach. These simulations are further used to extract useful conclusions for the FLC parameters adjustment for off-line-trained EMS based designs. Full article
Show Figures

Figure 1

Figure 1
<p>Electro-thermal microgrid architecture.</p>
Full article ">Figure 2
<p>Microgrid power profiles: (<b>a</b>) Photovoltaic power, (<b>b</b>) wind turbine power, (<b>c</b>) solar thermal collector power, (<b>d</b>) domestic load demand, (<b>e</b>) electric water heater power, and (<b>f</b>) domestic hot water equivalent power.</p>
Full article ">Figure 3
<p>Energy management strategy block diagram [<a href="#B43-applsci-11-01663" class="html-bibr">43</a>]. ©2018 IEEE, Reprinted, with permission from D. Arcos-Aviles et al., “Fuzzy-based energy management of a residential electro-thermal microgrid based on power forecasting,” in IECON 2018—44th Annual Conference of the IEEE Industrial Electronics Society, Washington, DC, USA, October 2018, pp. 1824–1829.</p>
Full article ">Figure 4
<p>Fuzzy controller membership functions (MF): (<b>a</b>) Power forecast error, (<b>b</b>) battery state-of-charge (SOC), and (<b>c</b>) fuzzy logic control (FLC) output [<a href="#B45-applsci-11-01663" class="html-bibr">45</a>]. ©2016 IEEE, Reprinted, with permission, from Arcos-Aviles D, Guinjoan F, Marietta MP, Pascual J, Marroyo L, Sanchis P. Energy management strategy for a grid-tied residential microgrid based on Fuzzy Logic and power forecasting. IECON 2016—42nd Annu. Conf. IEEE Ind. Electron. Soc., Florence, Italy: IEEE; 2016, pp. 4103–4108.</p>
Full article ">Figure 4 Cont.
<p>Fuzzy controller membership functions (MF): (<b>a</b>) Power forecast error, (<b>b</b>) battery state-of-charge (SOC), and (<b>c</b>) fuzzy logic control (FLC) output [<a href="#B45-applsci-11-01663" class="html-bibr">45</a>]. ©2016 IEEE, Reprinted, with permission, from Arcos-Aviles D, Guinjoan F, Marietta MP, Pascual J, Marroyo L, Sanchis P. Energy management strategy for a grid-tied residential microgrid based on Fuzzy Logic and power forecasting. IECON 2016—42nd Annu. Conf. IEEE Ind. Electron. Soc., Florence, Italy: IEEE; 2016, pp. 4103–4108.</p>
Full article ">Figure 5
<p>Resulting MFs through Cuckoo search (CS) algorithm (<b>a</b>) input <math display="inline"><semantics> <mrow> <msubsup> <mi>P</mi> <mi>E</mi> <mrow> <mn>3</mn> <mi>H</mi> <mo>*</mo> </mrow> </msubsup> </mrow> </semantics></math>, (<b>b</b>) input <span class="html-italic">SOC</span>, and (<b>c</b>) output <span class="html-italic">P<sub>FLC</sub></span>.</p>
Full article ">Figure 6
<p>Resulting MFs through Particle Swarm Optimization (PSO) algorithm (<b>a</b>) input <math display="inline"><semantics> <mrow> <msubsup> <mi>P</mi> <mi>E</mi> <mrow> <mn>3</mn> <mi>H</mi> <mo>*</mo> </mrow> </msubsup> </mrow> </semantics></math>, (<b>b</b>) input <span class="html-italic">SOC</span>, and (<b>c</b>) output <span class="html-italic">P<sub>FLC</sub></span>.</p>
Full article ">Figure 6 Cont.
<p>Resulting MFs through Particle Swarm Optimization (PSO) algorithm (<b>a</b>) input <math display="inline"><semantics> <mrow> <msubsup> <mi>P</mi> <mi>E</mi> <mrow> <mn>3</mn> <mi>H</mi> <mo>*</mo> </mrow> </msubsup> </mrow> </semantics></math>, (<b>b</b>) input <span class="html-italic">SOC</span>, and (<b>c</b>) output <span class="html-italic">P<sub>FLC</sub></span>.</p>
Full article ">Figure 7
<p>Resulting MFs through Differential Evolution (DE) algorithm (<b>a</b>) input <math display="inline"><semantics> <mrow> <msubsup> <mi>P</mi> <mi>E</mi> <mrow> <mn>3</mn> <mi>H</mi> <mo>*</mo> </mrow> </msubsup> </mrow> </semantics></math>, (<b>b</b>) input <span class="html-italic">SOC</span>, and (<b>c</b>) output <span class="html-italic">P<sub>FLC</sub></span>.</p>
Full article ">Figure 8
<p>Convergence chart.</p>
Full article ">Figure 9
<p>Grid power profile comparison for different EMS designs (<b>a</b>) heuristic, (<b>b</b>) CS algorithm, (<b>c</b>) PSO, and (<b>d</b>) DE algorithm.</p>
Full article ">Figure 10
<p>Grid power ramp-rates (<b>a</b>) EMS-FC, (<b>b</b>) EMS-CS, (<b>c</b>) EMS-PSO, and (<b>d</b>) EMS-DE.</p>
Full article ">
19 pages, 5793 KiB  
Article
Chinese Character Image Completion Using a Generative Latent Variable Model
by In-su Jo, Dong-bin Choi and Young B. Park
Appl. Sci. 2021, 11(2), 624; https://doi.org/10.3390/app11020624 - 11 Jan 2021
Cited by 8 | Viewed by 2836
Abstract
Chinese characters in ancient books have many corrupted characters, and there are cases in which objects are mixed in the process of extracting the characters into images. To use this incomplete image as accurate data, we use image completion technology, which removes unnecessary [...] Read more.
Chinese characters in ancient books have many corrupted characters, and there are cases in which objects are mixed in the process of extracting the characters into images. To use this incomplete image as accurate data, we use image completion technology, which removes unnecessary objects and restores corrupted images. In this paper, we propose a variational autoencoder with classification (VAE-C) model. This model is characterized by using classification areas and a class activation map (CAM). Through the classification area, the data distribution is disentangled, and then the node to be adjusted is tracked using CAM. Through the latent variable, with which the determined node value is reduced, an image from which unnecessary objects have been removed is created. The VAE-C model can be utilized not only to eliminate unnecessary objects but also to restore corrupted images. By comparing the performance of removing unnecessary objects with mask regions with convolutional neural networks (Mask R-CNN), one of the prevalent object detection technologies, and also comparing the image restoration performance with the partial convolution model (PConv) and the gated convolution model (GConv), which are image inpainting technologies, our model is proven to perform excellently in terms of removing objects and restoring corrupted areas. Full article
Show Figures

Figure 1

Figure 1
<p>The overview system diagram of the variational autoencoder with classification (VAE-C). VAE-C has two core technologies: disentangled distribution and target node value control.</p>
Full article ">Figure 2
<p>Graph of the latent variable of data with two labels. The x-axes and y-axes on the graph represent the different nodes of the latent variables, and the corresponding values represent node values. (<b>a</b>) Entangled distribution of data features, (<b>b</b>) disentangled distribution of data features. The distribution of data across x-nodes is disentangled; an entangled distribution is disentangled by adding the classification area.</p>
Full article ">Figure 3
<p>The process by which the variational autoencoder with classification (VAE-C) model removes unnecessary objects in the image: (<b>a</b>) The process of changing the node value in the latent variable to eliminate unnecessary objects. (<b>b</b>) The process of finding the node with the greatest influence among the nodes in the latent variable by using the class activation map (CAM) method. (<b>c</b>) The actual CAM image outputted using Chinese character images. The black area represents an area with value of less than 20%. The red arrow points to the node with the highest value.</p>
Full article ">Figure 4
<p>Model structure of the VAE-C, representing a structure in which classification is added to the layer corresponding to the mean <math display="inline"><semantics> <mi>μ</mi> </semantics></math> in the VAE model.</p>
Full article ">Figure 5
<p>Examples of Chinese characters whose shapes are similar but not identical. (<b>a</b>) Chinese character images; (<b>b</b>) represents the Unicode of the image.</p>
Full article ">Figure 6
<p>The appearance of Chinese character images extracted from ancient books. (<b>a</b>) The actual ancient book image. (<b>b</b>) Chinese character images from ancient books, extracted in the form of a bounding box (bbox) using object detection technology.</p>
Full article ">Figure 7
<p>An image that eliminates noise using the fuzzy binarization method. (<b>a</b>) An image without the fuzzy binarization method applied; (<b>b</b>) image with the fuzzy binarization method applied.</p>
Full article ">Figure 8
<p>The results outputted by using the VAE-C model: (<b>a</b>) Treating the Chinese letter image with an unnecessary object as an input value and outputting the result of removing noise, (<b>b</b>) treating the corrupted Chinese letter image as an input value and outputting the restored result.</p>
Full article ">Figure 9
<p>Changes in the output value according to the decrease in the node value with the greatest influence among the latent variables. (<b>a</b>–<b>d</b>) The qualitative result of removing unnecessary objects due to reduced node values. (<b>e</b>) The quantitative result for the scale of decreasing node values. MSE: mean square error; PSNR: peak signal-to-noise ratio; SSIM: structural similarity index measure.</p>
Full article ">Figure 10
<p>Changes in the output value according to the decrease in the node value with the greatest influence among the latent variables. (<b>a</b>–<b>d</b>) The qualitative results of image restoration due to reduced node values. (<b>e</b>) The quantitative result for the scale of the node value reduction.</p>
Full article ">Figure 11
<p>The results of restoring a corrupted image (<b>a</b>) that has corrupted the target image (<b>e</b>) using the partial convolution model (PConv) (<b>b</b>) [<a href="#B3-applsci-11-00624" class="html-bibr">3</a>], gated convolution model (GConv) (<b>c</b>) [<a href="#B4-applsci-11-00624" class="html-bibr">4</a>], and VAE-C model (<b>d</b>).</p>
Full article ">Figure 12
<p>Using the Places2 dataset [<a href="#B39-applsci-11-00624" class="html-bibr">39</a>], CelebA (celebrity faces attributes) face dataset [<a href="#B40-applsci-11-00624" class="html-bibr">40</a>], and Cifar-10 (Canadian Institute For Advanced Research-10) dataset [<a href="#B41-applsci-11-00624" class="html-bibr">41</a>], the results of restoring corrupted images (<b>a</b>) with the inpainting model (<b>b</b>,<b>c</b>) and the VAE-C model (<b>d</b>) are shown. The bottom Cifar-10 dataset represents the result of using a low-resolution image, (<b>e</b>) is ground-truth. The red area shows some areas enlarged to see the restored results in more detail.</p>
Full article ">Figure 13
<p>Comparison of the results of eliminating unnecessary objects by using the VAE-C model and Mask R-CNN (mask regions with convolutional neural networks).</p>
Full article ">Figure 14
<p>Comparison of actual images (<b>left</b>) and outputted images (<b>right</b>) using the VAE-C model. The outputted image using the VAE-C model has a lower quality than the actual image.</p>
Full article ">Figure 15
<p>Result of changing the background environment of images using the VAE-C model. It can be observed that the lower the node value, the greater the change in the background environment.</p>
Full article ">

2020

Jump to: 2023, 2022, 2021

19 pages, 4194 KiB  
Article
Dynamic Topology Model of Q-Learning LEACH Using Disposable Sensors in Autonomous Things Environment
by Jae Hyuk Cho and Hayoun Lee
Appl. Sci. 2020, 10(24), 9037; https://doi.org/10.3390/app10249037 - 17 Dec 2020
Cited by 18 | Viewed by 3038
Abstract
Low-Energy Adaptive Clustering Hierarchy (LEACH) is a typical routing protocol that effectively reduces transmission energy consumption by forming a hierarchical structure between nodes. LEACH on Wireless Sensor Network (WSN) has been widely studied in the recent decade as one key technique for the [...] Read more.
Low-Energy Adaptive Clustering Hierarchy (LEACH) is a typical routing protocol that effectively reduces transmission energy consumption by forming a hierarchical structure between nodes. LEACH on Wireless Sensor Network (WSN) has been widely studied in the recent decade as one key technique for the Internet of Things (IoT). The main aims of the autonomous things, and one of advanced of IoT, is that it creates a flexible environment that enables movement and communication between objects anytime, anywhere, by saving computing power and utilizing efficient wireless communication capability. However, the existing LEACH method is only based on the model with a static topology, but a case for a disposable sensor is included in an autonomous thing’s environment. With the increase of interest in disposable sensors which constantly change their locations during the operation, dynamic topology changes should be considered in LEACH. This study suggests the probing model for randomly moving nodes, implementing a change in the position of a node depending on the environment, such as strong winds. In addition, as a method to quickly adapt to the change in node location and construct a new topology, we propose Q-learning LEACH based on Q-table reinforcement learning and Fuzzy-LEACH based on Fuzzifier method. Then, we compared the results of the dynamic and static topology model with existing LEACH on the aspects of energy loss, number of alive nodes, and throughput. By comparison, all types of LEACH showed sensitivity results on the dynamic location of each node, while Q-LEACH shows best performance of all. Full article
Show Figures

Figure 1

Figure 1
<p>Diagram of Wireless Sensor Network (WSN).</p>
Full article ">Figure 2
<p>Image of disposable sensor.</p>
Full article ">Figure 3
<p>Diagram of WSN. (<b>a</b>) Flat networks routing protocols. (<b>b</b>) Hierarchical routing protocols (Low-Energy Adaptive Clustering Hierarchy (LEACH)).</p>
Full article ">Figure 4
<p>Histogram for fuzzifier value. (<b>a</b>) LMF histogram (<b>b</b>) UMF histogram</p>
Full article ">Figure 5
<p>Diagram of Q-learning.</p>
Full article ">Figure 6
<p>Workflow of research.</p>
Full article ">Figure 7
<p>Q-LEACH: Target matrix from original topology and Q-table probability.</p>
Full article ">Figure 8
<p>The node location (<b>a</b>) dynamic topology model, (<b>b</b>) static topology model.</p>
Full article ">Figure 9
<p>LEACH results on energy loss, number of alive nodes, throughput. (<b>a</b>–<b>c</b>) is the result from dynamic topology model and (<b>d</b>–<b>f</b>) is the result from static topology model.</p>
Full article ">Figure 10
<p>The comparison with related work.</p>
Full article ">
17 pages, 5443 KiB  
Article
Detection of Smoking in Indoor Environment Using Machine Learning
by Jae Hyuk Cho
Appl. Sci. 2020, 10(24), 8912; https://doi.org/10.3390/app10248912 - 14 Dec 2020
Cited by 22 | Viewed by 5690
Abstract
Revealed by the effect of indoor pollutants on the human body, indoor air quality management is increasing. In particular, indoor smoking is one of the common sources of indoor air pollution, and its harmfulness has been well studied. Accordingly, the regulation of indoor [...] Read more.
Revealed by the effect of indoor pollutants on the human body, indoor air quality management is increasing. In particular, indoor smoking is one of the common sources of indoor air pollution, and its harmfulness has been well studied. Accordingly, the regulation of indoor smoking is emerging all over the world. Technical approaches are also being carried out to regulate indoor smoking, but research is focused on detection hardware. This study includes analytical and machine learning approach of cigarette detection by detecting typical gases (total volatile organic compounds, CO2 etc.) being collected from IoT sensors. In detail, data set for machine learning was built using IoT sensors, including training data set securely collected from the rotary smoking machine and test data set gained from actual indoor environment with spontaneous smokers. The prediction accuracy was evaluated with accuracy, precision, and recall. As a result, the non-linear support vector machine (SVM) model showed the best performance with 93% in accuracy and 88% in the F1 score. The supervised learning k-nearest neighbors (KNN) and multilayer perceptron (MLP) models also showed relatively fine results, but shows effectivity simplifying prediction with binary classification to improve accuracy and speed. Full article
Show Figures

Figure 1

Figure 1
<p>Rotary smoking machines (<b>a</b>) RM200A2 of BORGWALDT (<b>b</b>) Operation of Smoking Machine RM200A2 (in Seoul, Korea).</p>
Full article ">Figure 2
<p>The experimental atmosphere: temperature and humidity changes.</p>
Full article ">Figure 3
<p>ICT-TVOC sensor (SVM30) (<b>a</b>) semiconductor sensor structure (<b>b</b>) principle of semiconductor sensor.</p>
Full article ">Figure 4
<p>ICT-Particulate Matter Sensor (SPS 30), (<b>a</b>) optical sensor structure, (<b>b</b>) principle of optical sensor.</p>
Full article ">Figure 5
<p>Block diagram of the measurement system and smoking detector.</p>
Full article ">Figure 6
<p>The machine learning algorithms cheat sheet to find the appropriate algorithms.</p>
Full article ">Figure 7
<p>Contextual matrix.</p>
Full article ">Figure 8
<p>Correlation results of graph in all situations.</p>
Full article ">Figure 9
<p>Correlation results of graph in smoking situations.</p>
Full article ">Figure 10
<p>Pre-processed training data.</p>
Full article ">Figure 11
<p>Data change depending on the situation in test data.</p>
Full article ">Figure 12
<p>3D Coordinate graph of (<b>a</b>) K-Means (<b>b</b>) PFCM (<b>c</b>) KNN (<b>d</b>) MLP (<b>e</b>) Linear SVM (<b>f</b>) SVM RBF model.</p>
Full article ">Figure 13
<p>Summary of performance comparison of cigarette detection algorithm.</p>
Full article ">Figure 14
<p>ROC Curve.</p>
Full article ">
17 pages, 3204 KiB  
Article
A Fuzzy Rule-Based GIS Framework to Partition an Urban System Based on Characteristics of Urban Greenery in Relation to the Urban Context
by Barbara Cardone and Ferdinando Di Martino
Appl. Sci. 2020, 10(24), 8781; https://doi.org/10.3390/app10248781 - 8 Dec 2020
Cited by 4 | Viewed by 2180
Abstract
We present a Geographical Information System (GIS)-based framework implementing a Mamdani fuzzy rule-based system to partition in an unsupervised mode an urban system in urban green areas. The proposed framework is characterized by high usability and flexibility. The study area is partitioned into [...] Read more.
We present a Geographical Information System (GIS)-based framework implementing a Mamdani fuzzy rule-based system to partition in an unsupervised mode an urban system in urban green areas. The proposed framework is characterized by high usability and flexibility. The study area is partitioned into homogeneous regions regarding the characteristics of public green areas and relations with the residents and buildings. The urban system is initially partitioned into microzones, given the smallest areas in which a census of the urban system is taken in terms of resident population, type and number of buildings and properties, and industrial and service activities. During a pre-processing phase, the values of specific indicators defined by a domain expert, which characterize the type of urban green area and the relationship with the residents and buildings, are calculated for each microzone. Subsequently, the fuzzy rule-based system component is executed to classify each microzone based on the fuzzy rule set constructed by the domain expert. Spatially adjoining microzones belonging to the same class are dissolved to form homogeneous areas called urban green contexts. The membership degrees of the microzones to the fuzzy set of their class are used to evaluate the reliability of the classification of the urban green context. We test our framework on the municipality of Pozzuoli, Italy, comparing the results with the ones obtained in a supervised manner by the expert appropriately partitioning and classifying the urban study area based on his knowledge of it. Full article
Show Figures

Figure 1

Figure 1
<p>Architecture of the framework.</p>
Full article ">Figure 2
<p>Census tracts of the municipality of Pozzuoli.</p>
Full article ">Figure 3
<p>Fuzzy numbers used to create the fuzzy sets.</p>
Full article ">Figure 4
<p>Schema of the fuzzy rule system implemented to classify the microzones.</p>
Full article ">Figure 5
<p>Thematic map of the indicator I<sub>1</sub> by microzone.</p>
Full article ">Figure 6
<p>Thematic map of the indicator I<sub>6</sub> by microzone.</p>
Full article ">Figure 7
<p>Thematic map of the fuzzified indicator I<sub>1</sub>.</p>
Full article ">Figure 8
<p>Thematic map of the fuzzified indicator I<sub>6</sub>.</p>
Full article ">Figure 9
<p>Thematic map of the microzones thematized by urban green area class (UGA class).</p>
Full article ">Figure 10
<p>Final urban green context (UGC) map thematized by UGA class.</p>
Full article ">Figure 11
<p>Thematic map of the reliability of the UGCs.</p>
Full article ">Figure 12
<p>UGCE map thematized by UGA class.</p>
Full article ">
13 pages, 7685 KiB  
Article
Design and Implementation of a Big Data Evaluator Recommendation System Using Deep Learning Methodology
by Sukil Cha, Mun Y. Yi and Sekyoung Youm
Appl. Sci. 2020, 10(22), 8000; https://doi.org/10.3390/app10228000 - 11 Nov 2020
Cited by 2 | Viewed by 2356
Abstract
As the number of researchers in South Korea has grown, there is increasing dissatisfaction with the selection process for national research and development (R&D) projects among unsuccessful applicants. In this study, we designed a system that can recommend the best possible R&D evaluators [...] Read more.
As the number of researchers in South Korea has grown, there is increasing dissatisfaction with the selection process for national research and development (R&D) projects among unsuccessful applicants. In this study, we designed a system that can recommend the best possible R&D evaluators using big data that are collected from related systems, refined, and analyzed. Our big data recommendation system compares keywords extracted from applications and from the full-text of the achievements of the evaluator candidates. Weights for different keywords are scored using the term frequency–inverse document frequency algorithm. Comparing the keywords extracted from the achievement of the evaluator candidates’, a project comparison module searches, scores, and ranks these achievements similarly to the project applications. The similarity scoring module calculates the overall similarity scores for different candidates based on the project comparison module scores. To assess the performance of the evaluator candidate recommendation system, 61 applications in three Review Board (RB) research fields (system fusion, organic biochemistry, and Korean literature) were recommended as the evaluator candidates by the recommendation system in the same manner as the RB’s recommendation. Our tests reveal that the evaluator candidates recommended by the Korean Review Board and those recommended by our system for 61 applications in different areas, were the same. However, our system performed the recommendation in less time with no bias and fewer personnel. The system requiresrevisions to reflect qualitative indicators, such as journal reputation, before it can entirely replace the current evaluator recommendation process. Full article
Show Figures

Figure 1

Figure 1
<p>Original text processing module.</p>
Full article ">Figure 2
<p>Big data platform architecture.</p>
Full article ">Figure 3
<p>The output of the big data valuation recommendation system.</p>
Full article ">Figure 4
<p>The outputs on the similar achievements and score of evaluator candidate recommendation.</p>
Full article ">
Back to TopTop